You are on page 1of 29

Higher Nationals in Computing

Unit 20: Cloud Computing


ASSIGNMENT 2

Learner’s name: DANG AN THANH


ID: GCS190644
Class: GCS0805A_PPT
Subject code: 1644
Assessor name: NGUYEN NGOC TU

Assignment due: 1 0 / 0 7 / 2 0 2 1 . Assignment submitted: 1 0 / 0 7 / 2 0 2 1


ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 16: Cloud Computing

Submission date 10/07/2021 Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Dang An Thanh Student ID GCS190644

Class GCS0805A_PPT Assessor name Nguyen Ngoc Tu

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid
P5 P6 P7 P8 M3 M4 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:


ASSIGNMENT 2 BRIEF
Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 9: Cloud Computing

Assignment title Cloud’s implementation and security threats

Academic Year 2018 – 2019

Unit Tutor DO Quoc Binh

Issue date Submission date 10/07/2021

IV name and date

Submission Format:

Format: A presentation in Power Point format (about 25 pages)


A security manual (in PDF format)
You must use font Calibri size 12, set number of the pages and use multiple line spacing at
1.3. Margins must be: left: 1.25 cm; right: 1 cm; top: 1 cm and bottom: 1 cm. The reference
follows Harvard referencing system.
Submission Students are compulsory to submit the assignment in due date and in a way requested by
the Tutors. The form of submission will be a soft copy posted on
http://cms.greenwich.edu.vn/
Note: The Assignment must be your own work, and not copied by or from another student or from
books etc. If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style. Make sure that you know how to reference
properly, and that understand the guidelines on plagiarism. If you do not, you definitely get failed

Unit Learning Outcomes:

LO3 Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
LO4 Analyse the technical challenges for cloud applications and assess their risks

Assignment Brief and Guidance:

Task 1

Base on the scenario and architecture design in the first assignment provide the
implementation. Because of the time constraint of the assignment, the implementation just
provides some demo functions of the scenario. The implementation includes two parts:

 A presentation (about 25 pages)


o which shows which functions are implemented
o How to config, deploy and test the services (Web application, Database Server,
Source code management, server logs.) using service provider’s frameworks
and open-source tools.
o Images for the built functions
 The source code for the built application

Task 2

The table of contents in your security manual (which should be 500–700 words) should be
as follows:

1. Analysis of the most common problems of a cloud computing platform.


2. Possible solutions to these problems.
3. Analysis of the most common security issues in the cloud environment.
4. Discussion on how to overcome these issues.
5. Summary.
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Develop Cloud Computing solutions using service provider’s


frameworks and open-source tools
D2 Critically discuss how one
P5 Configure a Cloud M3 Discuss the issues and can overcome these issues and
Computing platform with a constraints one can face during constraints.
cloud service provider’s the development process.
framework.

P6 Iimplement a cloud platform


using open-source tools.

LO4 Analyse the technical challenges for cloud applications and


assess their risks

P7 Analyse the most common M4 Discuss how to overcome D3 Critically discuss how an
problems which arise in a Cloud these security issues when organisation should protect
Computing platform and building a secure cloud their data when they migrate
discuss appropriate solutions to platform. to a cloud solution.
these problems.
P8 Assess the most common
security issues in cloud
environments.
Table of Contents
Unit 20: Cloud Computing ASSIGNMENT 2..........................................................................................1
P5 Configure a Cloud Computing platform with a cloud service provider’s framework.......................1
1. Tool and framework................................................................................................................1
1.1. IDE............................................................................................................................................1
1.2. Framework...............................................................................................................................1
1.3. Source code manager..............................................................................................................1
1.4. Database server.......................................................................................................................1
1.5. Cloud computing module........................................................................................................1
2. Deploy.....................................................................................................................................2
2.1. Config framework express on the env....................................................................................2
2.2. Config and connect with Mongodb.........................................................................................3
2.3. Config git and upload file to github........................................................................................5
2.4. Deploy code on Heroku server................................................................................................6
P6 Implement a cloud platform using open-source tools....................................................................7
1. Home......................................................................................................................................7
2. Top product.............................................................................................................................8
3. Add product............................................................................................................................8
4. Product...................................................................................................................................9
M3 Discuss the issues and constraints one can face during the development process.......................10
1. Programming.........................................................................................................................10
2. Debugging.............................................................................................................................10
3. Deloying (Git)........................................................................................................................10
D2 Critically discuss how one can overcome these issues and constraints.........................................11
1. Programming.........................................................................................................................11
2. Debugging.............................................................................................................................11
3. Deploying ( Git).....................................................................................................................12
P7 Analyse the most common problems which arise in a Cloud Computing platform and discuss
appropriate solutions to these problems..........................................................................................13
1. Analysis of The Most Common Problems...............................................................................13
2. Possible Solutions to These Problems....................................................................................14
P8 Assess the most common security issues in cloud environments..................................................15
M4 Discuss how to overcome these security issues when building a secure cloud platform..............16
D3 Critically discuss how an organization should protect their data when they migrate to a cloud
solution............................................................................................................................................17
1. Using reputable and quality Cloud Server service.....................................................................17
2. Choose a reputable provider.....................................................................................................18
3. Data encrypt.............................................................................................................................18
4. Backup data..............................................................................................................................19
SUMMARY.......................................................................................................................................19
REFERENCES.....................................................................................................................................20

Table of Figures
Figure 1 Download Node JS.....................................................................................................................................2
Figure 2 Install Express............................................................................................................................................3
Figure 3 Create a new cluster in MongoDB Atlas....................................................................................................3
Figure 4 Add IP Access List......................................................................................................................................4
Figure 5 Create Database........................................................................................................................................4
Figure 6 Get connection String................................................................................................................................5
Figure 7 Create a new repository............................................................................................................................5
Figure 8 Git repository.............................................................................................................................................6
Figure 9 Package.json..............................................................................................................................................6
Figure 10 Set up app.listen and PORT.....................................................................................................................7
Figure 11 Home.......................................................................................................................................................7
Figure 12 Top product.............................................................................................................................................8
Figure 13 Add new product.....................................................................................................................................8
Figure 14 Product....................................................................................................................................................9
Figure 15 Contact Us...............................................................................................................................................9
Figure 16 Create Router In Express.......................................................................................................................12
Figure 17 Embed Router In Main file.....................................................................................................................12
ASSIGNMENT 2 ANSWERS
P5 Configure a Cloud Computing platform with a cloud service provider’s framework.
1. Tool and framework
1.1. IDE
I use Visual Studio Code because:

 It is very light in weight and takes very little time to start.

 Support many other programming different include a lot of extensions, open source

 Many shortcuts are available to make the job easy.

 Visual Studio Code support terminal command for Heroku CLI and Git CLI.

1.2. Framework
In this project, I will use express framework. Express is a minimal and flexible Node.js web
application framework that provides a powerful feature set for web and mobile applications. With
a multitude of HTTP utility methods and middleware creation at your disposal, creating a powerful
API is quick and easy. Express provides a rich class of basic web application features, without
obscuring the Node.js features you know and love.

1.3. Source code manager


Github will help me manage and share source with other members of the project team. It also
helps in storing and also backing up source code.

1.4. Database server


In this project, I will use mongodb as my database because:

 It’s support online database, which you need only are create a mongodb account and
mongo atlas

 then get connection link.

 Document-oriented storage - Data is stored as JSON-style documents.

 High security.

 It’s nosql database

1.5. Cloud computing module


In the last stage, i will use Heroku to deploy the project in internet. Heroku is cloud computing
server which support us deploy the project in the PAAS model. It has the high scale and suitable for

Page |1
small to big company. Heroku is committed to a wide range of security policies with a professional
technical team working 24/7.

2. Deploy
2.1. Config framework express on the env
Express is a framework of nodejs, therefore the first thing which we need to do is download and
install nodejs.

Figure 1 Download Node JS

After finish the first stage, we need to create project and user terminal command to install express
with Node package manager: npm install express.

Page |2
Figure 2 Install Express

2.2. Config and connect with Mongodb


The next stage is connect to database. In this project, we will use mongodb atlast because it's more
suitable for the project than setting up mongodb in local. Therefore we need to create mongodb atlas
account.
Step 1: Create a new Cluster

Figure 3 Create a new cluster in MongoDB Atlas

Page |3
Step 2: In the recent cluster, click to the Network access and set the new privacy for the connect ip
address.

Figure 4 Add IP Access List

Step 3: Back to cluster tab and click to the collection. Click to the create database.

Figure 5 Create Database

Step 4: Choose the created cluster and click connect to get the connection string. You need to replace
the password with you current password.
Page |4
Figure 6 Get connection String

2.3. Config git and upload file to github


During web application development, I need to use Github to manage source and deploy it in heroku
to test. For each project, I will create one repository to manage.

Figure 7 Create a new repository

Page |5
You can find the source code in your repository in github

Figure 8 Git repository

2.4. Deploy code on Heroku server


To be able to deploy the project to heroku, we need to configure something before. In the visual
studio code terminal command. We will create package.json with npm init command.

Figure 9 Package.json

Page |6
Note that you should use the npm init command while opening the code file that is the root / main file
of your project. or you need to change it to your root / main file in package.json file. Beside, you web
application will be public in the internet so we need to change that PORT to process.env.PORT to
app.listen.

Figure 10 Set up app.listen and PORT

P6 Implement a cloud platform using open-source tools.


1. Home

Figure 11 Home

This is the first interface when using the website. It will show a navbar for menu list of function.

2. Top product

Page |7
Figure 12 Top product

It will show a product or top product.


3. Add product

Figure 13 Add new product

4. Product

Page |8
Figure 14 Product

5. Contact Us

Figure 15 Contact Us

M3 Discuss the issues and constraints one can face during the development process.
There are many difficulties when i develop and implement this project.
Page |9
1. Programming
Other than that this is my first time using it, I made quite a few mistakes during development. Nodejs
has too many different frameworks like Express, NestJs, SailJs, KoaJs. Each framework has some
different pros and cons. This makes me very confused in choosing the right framework for the project.
After choosing a suitable framework, we have to choose the suitable view engine ... Because Nodejs is
an open source platform, so it has the advantage of abundant community-resources not like other
closed platform like asp, javaspring, ... This leads to inconsistency in naming libraries. These libraries all
have similarities and differences, so it can be difficult to distinguish when searching for tutorial
articles. During the first use, when i dont remember the exactly name of handlebars and only install
handlebar library but it's still work till i have some bugs and need to uninstall and reinstall handlebars.
Each library has its own specific syntax, so I confused a lot when looking up their functions.

Next, I ran into a problem working with the view engine. Different from writing server side and client-
side code together in one file. Source Code is structured in a model that is almost equivalent to MVC.
Hence transferring the data between my view and routes in the early stages encountered some
difficulties.

Beside, when working with data, I had many errors about asynchronous processing. Unlike some other
server-side languages, javascript strictly handles asynchronous handling. It is easy to make an error if
we use the inappropriate callback functions.

2. Debugging
When i start to write code, all code are written in the one file is server.js. it make debug become more
hard but easier to get error. When the software is too functional, route naming will easily be
duplicated. When a bug occurs, it's very hard to find the module which is related to the bug. In
addition, passing data between the views and routes also sometimes leads to errors and makes it
difficult to detect the cause. Because, the cause may be database or form.

3. Deloying (Git)
When using git, I ran into problems when the github GUI repositories did not sync with repositories on
the web. Using git in the console was quite difficult for me as I did not remember all the commands.

D2 Critically discuss how one can overcome these issues and constraints.

P a g e | 10
I did research and learn how to fix it. In this part, i will list some difficulties which i have to
encountered and how i can overcome them.

1. Programming

Faced with the above problems, the first thing I did was to thoroughly re-learn how nodejs works. By
understanding the basic keywords as well as operating principles, I analyzed pros, cons and chose
express as framework for the project. Then I chose hbs view engine because its syntax and keywords
are easy to remember. In addition, hbs has a lot of users, so it's easy to look up information. because
nodejs is inconsistency in naming libraries. so I'll just read the articles and documentation on the
nodejs homepage.

Also, when consulting the tutorials on forums, I need to look up exactly which library I am using. For
example, with handlebars viewengine I have 2 libraries: hbs and handlebars. They have a lot of
similarities such as supporting 1 view engine, compile, register helper, .... However, I will only select 1
library for the whole article to ensure consistency.

For asynchronous handling I have chosen to use async function and await instead of the callback
function. Async / await is a special syntax that makes working with Promises easier. When using
async / await, the structure of an asynchronous handler will be more similar to a synchronous handler.
If handled this way, even if I make more requests, the program structure is still very clear and
coherent.

2. Debugging

To resolve the problem, i have use router function of express. Which router function, i can divide the
app.js to many other route with different features. The names of the routes in each router may
overlap. It makes finding bugs easier, when a function occur errors, i can find exactly which router and
route relate to it.

Figure 16 Create Router In Express

In figure below, I have divided app to 7 main router. Product router has all the function relate to the
product like update, delete , add ... It’s the same for category and supplier router.
P a g e | 11
Figure 17 Embed Router In Main file

3. Deploying ( Git)

I searched for information about that problem on forums like stackoverflow and found the cause. The
Git GUI will only show the repositories in the Github directory in the document. So when I create a
new repository I will create in that directory. Also I have tried to learn the command commands and it
was not too difficult. Now i have switched to using command instead of GUI.

P7 Analyse the most common problems which arise in a Cloud Computing platform and discuss
appropriate solutions to these problems.
1. Analysis of The Most Common Problems

In recent years researchers have conducted surveys from which to make findings about the challenges
of current cloud computing. Since then, the risks have become the top concern

Security issue:

P a g e | 12
 Regarding data security, we cannot see the exact location where your data is stored or being
processed. This increases the risks of cloud computing that may arise during cloud deployment
or management.

 This makes it hard to trust sensitive and proprietary data into a third party and, indeed,
highlights the challenges of cloud computing.

Cost management and containment:

 One of the next risks of cloud computing is cost.

 In the cloud, an organization can easily enhance its processing capabilities without investing
heavily in new hardware. Instead, businesses can access additional processing through paid
models from public cloud providers. However, the on-demand nature and scalability of cloud
services make it sometimes difficult to quantify and predict quantities and costs.

Lack of resources/expertise:

 One of the cloud challenges that companies and businesses are facing today is the lack of
specialized resources.

 Organizations are increasingly putting more workload into the cloud while cloud technologies
continue to grow rapidly. Due to these factors, organizations are having difficulty keeping up
with the tools.

Compliance:

 One of the risks cloud computing is facing today is compliance. One of the risks that cloud
computing is facing today is compliance.

 Every time a company moves data from internal storage to the cloud, it faces compliance with
industry laws and regulations.

Performance:

 When an enterprise moves to the cloud, it will depend on the service provider.

 When our suppliers go down, so do our businesses.

 With the inherent lack of control that comes with cloud computing, companies may encounter
real-time monitoring issues.

Migration:

P a g e | 13
 When businesses move from old technology to cloud computing will face many difficulties and
challenges.

The common challenges encountered when converting:

 Troubleshooting extensions.

 Security challenge.

 Data transfer is slow.

 Migration agents.

 Complex conversion.

 Time to stop the application.

Building a private cloud:

 This is one of the main challenges for cloud computing.

 IT managers and IT departments will need to address the build and redo work by themselves,
which can pose one of the most difficult challenges when moving to cloud computing.

2. Possible Solutions to These Problems

Security issue:

 To ensure your organization's privacy and security intact, verify SaaS providers have security
management, authentication, and access control mechanisms in place. Also, check the
database privacy and security laws that they must follow.

 While we are checking supplier privacy and security laws, make sure to also confirm the third
major issue of concern: compliance. Our organization needs to be able to comply with
regulations and standards, regardless of where our data is stored.

 Speaking of storage, also make sure the provider has strict data recovery policies.

Cost management and containment:

 We can optimize costs by conducting better financial analysis and reporting, automating
policies to manage or maintain management reporting practices, to reduce these issues in the
power sector. cloud computing

Lack of resources/expertise:

 A specialist is needed to keep up with the technologies at work.


P a g e | 14
 Companies are turning to DevOps tools, such as Chef and Puppet, to perform tasks such as
resource usage monitoring and automated backups at predefined intervals. These tools also
help optimize the cloud for cost, administration and security.

Compliance:

 Data must be properly stored.

 Cloud customers need to look for suppliers who can provide compliance and check if they are
regulated by the standards they need.

 Some suppliers provide certified compliance, but in some cases, additional input is required for
both parties to ensure compliance.

Performance:

 Make sure their suppliers have proper procedures and they will alert you if there is a problem.

 Enterprises must consider being able to access data stored in the cloud in real time while
selecting the right partner.

 Businesses need to ensure your SaaS provider has a real-time monitoring policy to help
mitigate these problems.

Building a private cloud:

 Need to automate as much as possible in the cloud transition. The tasks that must be
performed in order are also important. Businesses need to plan for long-term goals.

P8 Assess the most common security issues in cloud environments.


Distributed-Denial-of-Service Attacks (DDoS)

 It is an attempt to make users unable to use a computer's resources

 Its main goal is to make a site, or network, unusable, disruptive, or make the system
significantly slower for the average user, by overloading the system's resources.

 Distributed denial of service (DDoS) attacks on cloud platforms are largely unimaginable; The
immense number of resources of cloud services makes DDoS attacks extremely difficult to get
started.
Shared Cloud Computing Services:

 Many cloud solutions do not provide the necessary security between clients, resulting in
shared resources, applications, and systems.

P a g e | 15
 In this case, threats may originate from other customers with cloud services, and threats
targeting one customer may also have an impact on other customers.
Employee Negligence:

 Employee negligence and employee mistake remain one of the biggest security issues for all
systems, especially cloud computing.

 The negligent employee login to the cloud system by the network is not secure also makes the
system threatened.
Data Loss and Inadequate Data Backups:

 Ransomware is a threat to businesses; it stems from inadequate data backup and inadequate
data synchronization. Ransomware will encrypt company files and demand ransom from the
company
Phishing and Social Engineering Attacks:

 Due to the openness of a cloud computing system, phishing and social engineering attacks
have become particularly common.

 Providing login information, confidential information to customers, will accidentally make


malicious users can easily access the system, because the system can be accessed anywhere.
System Vulnerabilities:

 Cloud systems can still contain system vulnerabilities, especially in networks with complex
infrastructure and many third-party platforms. When a vulnerability is known to a common
third-party system, it becomes a weapon against the company.
M4 Discuss how to overcome these security issues when building a secure cloud platform.

Organizational security risks:

CSP employees can be minimized by placing strict legal constraints on contracts when hiring
employees. A comprehensive review of third-party CSPs, as well as a robust breach notification
process, will also go a long way to prevent this.

Physical security risks:

The risk of intruders having physical access to devices used in providing cloud services can be reduced
by preventing strong physical security such as protection. armed, access key cards and biometric scans
to restrict access to sensitive locations in the data center.

Technology security risks:

P a g e | 16
Technology security risk management - CSP can use the hierarchical structure of DHT-based overlay
networks, with specific tasks performed by each layer. The lowest layer involves the use of different
sources to verify certain connections and refers to checking if there are any known sources of
malignancy involved. The highest class handles various attacks.

Compliance and audit risk:

This area is primarily concerned with legal issues and as such, both CSP and CSC need to understand
the legal and legal obligations and ensure that any contract is implementation of these obligations CSP
also needs to ensure that its discoverability does not affect the security and privacy of data.
Employees need to raise awareness, learn more knowledge about cyber- attacks to know how to
prevent them.

D3 Critically discuss how an organization should protect their data when they migrate to a cloud
solution.

1. Using reputable and quality Cloud Server service

Cloud technology is developing day by day, security is also more complete. To ensure the safety of
Cloud Server, the system has advanced security in many layers, ensuring safety for data in and out of
the system, However, hacker attacks are also more and more sophisticated. ITs and businesses need
to update the most modern security technology and software to ensure data safety on the Cloud. Use
reputable and quality Cloud Server services so that vulnerabilities are discovered and patched in a
timely manner, ensuring data safety.

For example: when a new updated version, there are so many hackers will try to break its security
system. Therefore, the software will always need to have updated patches.

2. Choose a reputable provider

Choosing a reputable provider is considered a top priority when using Cloud Server. Because new
reputable providers ensure your data is secure and secure. The IT team of the enterprise also needs to
keep up with and fully update security methods to prevent network threats aimed at Cloud Server.

P a g e | 17
In this project, I have chosen Heroku as service provider. According to the survey of (trustradius.com,
2020) Heroku get the score is 8.7 / 10 from 136 reviews. It’s the score is quite high for a cloud service
distributor.

In addition, there are many large and small businesses choosing heroku such as Toyota, Citrix,
Westfield, Yesware, ...

3. Data encrypt

Data encryption can be considered as the last layer of defense of the business against outside threats.
It is like a thief can break into your home but cannot unlock the safe. Data encryption in the cloud is
the process of transforming or encoding data before moved to cloud storage (Olufohunsi, 2019).
Typically cloud service providers offer encryption services - ranging from an encrypted connection to
limited encryption of sensitive data - and provide encryption keys to decrypt the data as needed.
Currently, vendors often support encryption services as a service, such as Microsoft Azure, Amazon
Web Services (AWS), Salesforce, ... However, this may lead to the number of incidents is not worth it.
When the "encryption key" of the CSP can be stored together with the data. Therefore, businesses
should adopt a BYOK - Bring your own key approach to ensure optimal data protection. Take the
example of Office 365, Microsoft's on-demand cloud application widely used by organizations across
the globe to support employee mobility by providing anytime, anywhere access to applications.
Microsoft email - MS Outlook and business utility applications like MS Word, Excel, PowerPoint etc
Gemalto's BYOK solutions (SafeNet ProtectApp and SafeNet KeySecure) for Office 365 not only ensure
that organizations have complete control of their encrypted cloud data, but also support efficient
management of encryption keys of other cloud applications such as Azure, AWS, Google Cloud, and
Salesforce (Gemalto, 2020).

4. Backup data

Most businesses today are not aware of the importance of backing up data as well as having backup
plans when unfortunately, something goes wrong with their website system. Operating system errors,
software errors, malicious servers, corrupted hardware devices, hacker attacks ... are potential risks
that can lose or damage important corporate data (information customers, email, books, transaction
documents, contracts ...). Therefore, regularly backing up business data online is an urgent and
extremely necessary job. However, storing backups on the cloud servers doubles the rate of attacks.
P a g e | 18
Therefore, the security measures I mentioned above should also be applied where the backup data is
stored (Rouse, 2020).

SUMMARY

After this project, I have learned a lot more about cloud computing, including fundamental concepts
about cloud computing like high performance computer, networking, and cloud architecture. Beside i
have a chance to work with new technology are express-nodejs and mongodb. And my final product
has applied cloud computing and deployed on heroku platform as PAAS model. In addition, problems
that arise during cloud development such as security, .. have been applied in the article.

My website: https://web210604.herokuapp.com

My source code: https://github.com/anthanh-github/ATN_SHOP

P a g e | 19
REFERENCES
1. Aslan, T., 2012. Cloud physical security considerations. [Online] Available at:
https://www.ibm.com/blogs/cloud-computing/2012/02/22/cloud-physical-security-
considerations/ [Accessed 3 July. 2021].

2. Chandra, C., 2017. Data Loss Prevention. [Online] Available at:


https://blogs.informatica.com/2017/05/03/data-loss-vs-data-leakage-prevention-whats-
difference/ [Accessed 4 July.2021].

3. Gemalto, 2020. Securing Access to Microsoft Office 365 with SafeNet Strong authentication
from Gemalto. [Online] Available at: https://www6.thalesgroup.com/APAC-EN-201703-
AuthOffice365-LP [Accessed 4 July.2021].

4. Hein, D., 2019. 7 Cloud Storage Security Risks You Need to Know About. [Online] Available at:
https://solutionsreview.com/cloud-platforms/7-cloud-storage-security-risks-you-need-to-
know about/ [Accessed 6 July 2020].

5. Nayyar, A., 2019. Handbook of Cloud Computing. 1st ed. s.l.:BPB Publication.

6. Olufohunsi, T., 2019. DATA ENCRYPTION. s.l.:s.n.

7. Rouse, M., 2020. What is cloud backup and how does it work?. [Online] Available at:
https://searchdatabackup.techtarget.com/definition/cloud-backup [Accessed 8 July 2020].

8. Team, U., 2020. What Are Cloud Leaks?. [Online] Available at:
https://www.upguard.com/blog/what-are-cloud-leaks [Accessed 8 July.2020].

9. trustradius.com, 2020. [Online] Available at: https://www.trustradius.com/products/heroku-


platform/reviews [Accessed 9 July.2020].

10. Worlanyo, (2015. A survey of cloud computing security: issues, chalenges and solutions..
s.l.:s.n.

P a g e | 20

You might also like