0% found this document useful (0 votes)
2 views18 pages

Cloud Computing

The document is a practical file for a Cloud Computing Lab course, detailing various experiments and their procedures. It covers installations of Virtual Box and VMware, simulating cloud scenarios, studying Amazon Web Services (AWS), and understanding cloud security management. Each experiment includes aims, procedures, and relevant information to guide students in their practical learning.

Uploaded by

dhandasanmeet86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views18 pages

Cloud Computing

The document is a practical file for a Cloud Computing Lab course, detailing various experiments and their procedures. It covers installations of Virtual Box and VMware, simulating cloud scenarios, studying Amazon Web Services (AWS), and understanding cloud security management. Each experiment includes aims, procedures, and relevant information to guide students in their practical learning.

Uploaded by

dhandasanmeet86
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

PRACTICAL FILE

of
CLOUD COMPUTING LAB
[BTCS 613-18]
B.Tech – 6th Semester
[Batch 2021-25]

Submitted To: Submitted By:


Er. Gursharan Saini YUVAM
AP, CSE/IT Dept. 2106698

Department of Computer Science Engineering

Rayat Bahra Institute of Engineering


And Nano-Technology, Hoshiarpur

1|Page
List of Practicals
SR NO. NAME OF PRACTICAL PAGE NO. DATE REMARKS

2|Page
EXPERIMENT 1
AIM :- Install Virtual Box/VMware Workstation on different OS.
PROCEDURE:
Steps to install Virtual Box:
1. Download the Virtual box exe and click the exe file…and select next button..

2. Click the next button

3. Click the next button

3|Page
4. Click the YES button
5. Click the install button

6. Then installation was completed..the show virtual box icon on desktop screen…

4|Page
EXPERIMENT 2
AIM :- Install different operating systems in VMware.
INTRODUCTION :- The process to install a new operating system in VMware
Workstation is fairly straightforward because the setup wizard makes things super easy.
Below are step-by-step screenshots showing everything you need to know, from the initial
setup screen all the way to booting into the new operating system.
PROCEDURE :-
1. Open the VMware machine .
2. Go to File > New Virtual Machine.

3. Select Typical (recommended), and then press Next.

4. Pick how to install the operating system.

5|Page
5. Choose precisely where the OS files are located.

6. Press Next to proceed to the screen where you name the new virtual machine and pick
where its files should be stored. Fill out that information and then select Next again.

7. Define how storage should take place with this virtual machine, and then press Next.

6|Page
8. Select Customize Hardware and make any necessary changes. You can change details
about the memory, processors, disc drive, network adapter, USB controller, sound card,
printer, and display.

9. Choose Close to exit the Hardware screen, and then press Finish.

10. Follow any on-screen prompts to begin the OS installation. For example, if you
see Press any key to boot from CD or DVD, do that to start the OS setup.

7|Page
11. Follow the directions for your specific operating system install to add the OS to
VMware Workstation.

8|Page
EXPERIMENT 3

AIM :- Simulate a cloud scenario using simulator.

PROCEDURE :- Step 1: Download Intelij Idea IDE for Java Developers. It is developed by
the CLOUDS Lab organization and is written entirely in Java so we would need a Java IDE to
simulate a cloud scenario using CloudSim.

Step 2: Download the CloudSim 3.0.3 zip file from GitHub and extract the folders within a
folder in our computer storage.

Step 3: Download Apache Commons Math 3.6.1 zip file. It is required as it provides a faster,
more accurate, portable alternative to the regular Math and StrictMath classes for large-scale
computation in java files.

9|Page
Step 4: Open Intelij Idea IDE and create a new Java Project.

Step 5: The above-mentioned Java Project should be created with the location of the
previously downloaded and extracted CloudSim 3.0.3 folder.
Step 6: The JAR file from the extracted Apache Commons Math 3.6.1 folder needs to be
added to the JAR files of CloudSim.

Step 7: Now the CloudSim Environment has been setup in the Eclipse IDE.

10 | P a g e
EXPERIMENT 4

Aim :- Case Study - Amazon Web Services/Microsoft Azure/Google cloud services.

What is AWS?

Amazon Web Services (AWS) is a subsidiary of Amazon providing on-demand cloud computing
platforms and APIs to individuals, companies, and governments, on a metered pay-as-you-go
basis.

Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud
platform, offering over 175 fully-featured services from data centres globally. Millions of
customers — including the fastest-growing startups, largest enterprises, and leading government
agencies — are using AWS to lower costs, become more agile, and innovate faster.

History of AWS :-

Amazon launched its first cloud computing services, Simple Storage Service (S3) in March of
2006. But the idea for the public cloud began germinating at the company several years earlier.

A popular myth says that Amazon began selling public cloud computing services because it had
“excess capacity” from running its eCommerce website. Executives have repeatedly contradicted
that story, saying that Amazon Web Services was designed from the ground up as a service for
outside customers. However, the company’s experiences with eCommerce did help lay the
groundwork for AWS.

In the early 2000s, Amazon.com’s internal development team had a problem. They were adding a
lot of software engineers, but despite the growing headcount, the pace of development was
staying about the same. The issue was that each developer was setting up new and unique
compute, storage and database resources for each project. The IT group realized that if they could
standardize those resources and simplify the process of deploying new IT infrastructure, they
might be able to speed things up.

AWS Regions:-

11 | P a g e
Benefits of AWS :-

 Most functionality -AWS has significantly more services, and more features within those
services, than any other cloud provider–from infrastructure technologies like compute,
storage, and databases–to emerging technologies, such as machine learning and artificial
intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and
more cost-effective to move your existing applications to the cloud and build nearly anything
you can imagine. AWS also has the deepest functionality within those services. For example,
AWS offers the widest variety of databases that are purpose-built for different types of
applications so you can choose the right tool for the job to get the best cost and performance.

 The largest community of customers and partners -AWS has the largest and most
dynamic community, with millions of active customers and tens of thousands of partners
globally. Customers across virtually every industry and of every size, including startups,
enterprises, and public sector organizations, are running every imaginable use case on AWS.
The AWS Partner Network (APN) includes thousands of systems integrators who specialize
in AWS services and tens of thousands of independent software vendors (ISVs) who adapt
their technology to work on AWS.

 Most secure-AWS is architected to be the most flexible and secure cloud computing
environment available today. Our core infrastructure is built to satisfy the security
requirements for the military, global banks, and other high-sensitivity organizations. This
is backed by a deep set of cloud security tools, with 230 security, compliance, and
governance services and features. AWS supports 90 security standards and compliance
certifications, and all 117 AWS services that store customer data offer the ability to
encrypt that data.

 Fastest pace of innovation -With AWS, you can leverage the latest technologies to
experiment and innovate more quickly. We are continually accelerating our pace of
innovation to invent entirely new technologies you can use to transform your business. For
example, in 2014, AWS pioneered the serverless computing space with the launch of

12 | P a g e
AWS Lambda, which lets developers run their code without provisioning or managing
servers. And AWS built Amazon SageMaker, a fully managed machine learning service
that empowers everyday developers and scientists to use machine learning–without any
previous experience.

 Most proven operational expertise — AWS has unmatched experience, maturity,


reliability, security, and performance that you can depend upon for your most important
applications. For over 13 years, AWS has been delivering cloud services to millions of
customers around the world running a wide variety of use cases. AWS has the most
operational experience, at greater scale, of any cloud provider.

 Agility- The cloud gives you easy access to a broad range of technologies so that you can
innovate faster and build nearly anything that you can imagine. You can quickly spin up
resources as you need them–from infrastructure services, such as compute, storage, and
databases, to the Internet of Things, machine learning, data lakes and analytics, and much
more. You can deploy technology services in a matter of minutes, and get from idea to
implementation several orders of magnitude faster than before. This gives you the freedom
to experiment, test new ideas to differentiate customer experiences and transform your
business.

 Elasticity -With cloud computing, you don’t have to over-provision resources upfront to
handle peak levels of business activity in the future. Instead, you provision the number of
resources that you actually need. You can scale these resources up or down to instantly to
grow and shrink capacity as your business needs change.

 Cost Savings-The cloud allows you to trade capital expenses (such as data centres and
physical servers) for variable expenses and only pay for IT as you consume it. Plus, the
variable expenses are much lower than what you would pay to do it yourself because of
the economies of scale.

 Deploy Globally in minutes-With the cloud, you can expand to new geographic regions
and deploy globally in minutes. For example, AWS has infrastructure all over the world,
so you can deploy your application in multiple physical locations with just a few clicks.
Putting applications in closer proximity to end users reduces latency and improves their
experience.

When to Use AWS :-

AWS offers something for everyone — whether you are a developer working on a hobby project
or a Fortune 500 company looking to become more agile. It is the generalist of the public cloud
computing market with a huge array of services available. It is often used in hybrid IT.

13 | P a g e
As the first and largest cloud provider, AWS has very mature, tested offerings. It is unlikely to go
out of business anytime soon, and it is a solid choice for most cloud computing use cases.

Additionally, the company is innovating at a breathless pace, and it’s reasonable to assume that its
product and solution portfolio will expand considerably in the years ahead.

When Not to Use AWS :-

If AWS has a weakness, it is its lack of offerings for hybrid cloud deployments. Analysts say that
most enterprises will be pursuing a hybrid cloud, multi-cloud strategy, and Amazon’s competitors
Microsoft Azure and IBM have an advantage in this area. Because many large organizations
already use Microsoft and IBM products in their data centres, they naturally gravitate to these
other providers for the public cloud portion of their hybrid clouds.

And the jury is still out on whether AWS will be the best option for emerging technologies like
artificial intelligence, machine learning, the Internet of Things and containerized deployments. All
of the leading vendors are competing heavily in these areas, and AWS will have to continue to
innovate if it wants to retain its position as the market leader. In the technology industry, markets
can shift very quickly, and being the number one provider today is no guarantee of future
performance.

AWS Use Cases

Millions of customers — including the fastest-growing startups, largest enterprises, and leading
government agencies — are using AWS to lower costs, become more agile, and innovate faster.In
every field, the AWS service is used. Below are some areas and some top companies use AWS.

 Aerospace (NASA, Maxar, ESA etc.)

 Gaming (MPL, FanFight, Gammation etc.)

 Education (Coursera, BYJU’s etc.)

 Telecommunication (Pinterest, Vodafone, Aircel etc.)

 Entertainment (Netflix, Hotstar etc.)

 Media (BBC, The Hindu, Punjab Kesri etc.)

14 | P a g e
EXPERIMENT 5

Aim :- To study cloud security management.


What is Cloud Security management ?
Cloud security management is the practice of securing your data and operations in the cloud
from theft or damage. As demand for cloud computing expands, cloud security services are
expected to grow as organizations become more aware of the importance of securing their
presence in the cloud. This article tackles what cloud security management means and why it is
important, how to evaluate cloud security management service providers, and the pros and
challenges of cloud security management.

Importance of security management in the cloud :-


Much like traditional computing, cloud computing poses security challenges for your
organization. It can even be argued that cloud-based IT infrastructures are more challenging to
secure than traditional data centers since the cloud presents a much wider attack surface.

When venturing into the cloud for the first time, or if you already have a presence there but want
to improve your cloud security posture, you should carefully consider the type of cloud
environment that is right for your organization . You have a choice between public, private, and
hybrid cloud environments.

The public cloud may prove attractive since you can offload much of the management work to a
third party, but study your provider’s security practices and infrastructure closely, and ensure
that these are enough to protect your organization from security risks.

As for a private cloud, while you have greater control over its security, it is often more costly
than the public cloud. The hybrid cloud, which is a mix of public and private clouds, may seem
like the ideal solution, but it, too, has its drawbacks, chief of which is the difficulty of enforcing
distinct policies across two distinct types of cloud environments.

Implementation of security management in cloud computing :-


Among several strategies you can adopt to keep your cloud secure are:

 Perform security audits. Analyze your cloud-based products and services for
potential security loopholes on a regular basis.

 Set appropriate levels of protection. Task your IT security team with complete
control of the security settings for your cloud-based applications, setting them to the
highest level possible.

15 | P a g e
 Use data encryption and network security monitoring tools. Add another level of
protection to your data by encrypting them, and only allow legitimate traffic into your
network.

 Manage end-user devices. Make sure that only authorized devices are given access
to your network and data.

 Manager users. Set appropriate user-level controls to limit data access to authorized
users only. Ensure that your users only have access to the data they need in their line
of work.

 Monitor user activity. Make use of reports to view user activity in your cloud, and
gain a better understanding of security risks surrounding your operations.

Evaluation of cloud service providers for cloud security management :-


When choosing a cloud service provider, you may want to perform the following checks on how
it will handle your data and applications:

 Review if its security policies and procedures are enough to protect your sensitive
data adequately while it is at rest or in transit within and outside your network.

 Review existing policies on protecting the privacy of your information since data
breaches can ruin your reputation. Emphasize the importance of keeping your
information and data protected from threat actors.

 Assess the processes for keeping your cloud-based applications secure, since it is
necessary to keep your operations uninterrupted. For example, look at the procedures
in place to protect your applications from distributed denial- of- service (DDoS)
attacks.

 Check that the security controls on its their physical infrastructure provide adequate
protection against external and environmental threats. For example, servers must be
put in a secure area that cannot be accessed by just anybody without proper
authorization.

 Set up a governance framework that outlines the roles and responsibilities of your
employees and everyone else involved in the project, including the provider’s
employees tasked to liaise with and assist your organization.

16 | P a g e
 Audit the provider’s operational and business processes for conformance to your own
security standards.

Benefits of cloud security management :-


Among the benefits that your organization stands to gain from outsourcing cloud security
management are:

 Remote monitoring capabilities. Most providers enable viewing of entire cloud


infrastructures through a dashboard that is accessible from anywhere. Your IT team
can assess the effectiveness of your security practices through this dashboard.

 Convenient user and device management.Bring your own device (BYOB) became
widely acceptable as remote work boomed. A network with many user-owned
devices brings a myriad of problems, including malware entering the network and
infecting your devices. By putting your applications and data on the cloud, your IT
team can manage devices and users securely and from anywhere.

 Emphasis on data protection. Safeguards such as access control and threat detection
are all part of cloud security management practices meant to guardsecure your data
from security threats.

 Enforcement of internal and external security policies and standards. A better


view of your IT infrastructure improves your ability to catch violations against
company policies on security and compliance early and before they inflict any
damage on your organization.

 Selection of vendors with security practices that meet your standards.:As a


customer, perform due diligence and only select a provider that allows you to
approximate the security of your traditional IT infrastructure. Reputable vendors such
as (Amazon Web Services (AWS), Google Cloud Platform, and Microsoft Azure may
be more responsive to your needs for more security. Negotiate with the vendor so that
your requirements are included in Service Level Agreement (SLA).

Challenges of cloud security management :-


There are also challenges in cloud security, including:

17 | P a g e
 Difficulties in tracking data use.This is especially true since cloud services
provided by a third-party vendor lie outside your corporate network. Be prepared to
ask your vendor for audit trail logs when necessary.

 Security risks inherent in multi-tenant environments. Multi-tenant environments


may expose your network to malicious attacks. Even if someone else’s network is
targeted, your network may still end up as collateral damage. The risk may be lower
when you have a reputable vendor host your cloud environment.

 Access restriction management. Ensuring access restrictions in your on-premises


infrastructure are carried over to your cloud environment. When applicable, your IT
team must ensure that you have BYOD policies for your end -users, and that only
authorized devices and locations are allowed access to your cloud services.

 Meeting compliance requirements. Ensure that your cloud services pass compliance
requirements. You may assume that the vendor will take care of compliance. This is a
mistake that can lead to heavy fines from regulators. Since compliance is always your
responsibility, you should have a team ready to handle this for your organization.

 Asset misconfiguration potential. A misconfiguration can leave your network open


to attack. To prevent this from happening, assign a team to review configuration
settings and changes. Have a team ready to plug potential holes when needed.

18 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy