CC Project Report

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 19

Mobile App Landing

Page

Submitted by
Rohit Haval
Roll No.:-23
Hrushikesh Patil
Roll No.:-47
Ashish Yadav
Roll No:- 75
Vipul lokhande
Roll No:- 34

Under the Guidance of


PROF.Vishakha Kharche

DEPARTMENT OF COMPUTER ENGINEERING


KONKAN GYANPEETH COLLEGE OF ENGINEERING
KARJAT-410201
2021-2022
Certificate
This is to certify that the project entitled ArtWorld Website is a bonafide work of Rohit
Haval (Roll No:-23), Hrushikesh Patil (Roll No:-47), Ashish Yadav (Roll No:-75)
submitted to the University of Mumbai in partial fulfillment of the requirement for the
award of the degree of Undergraduate in DEPARTMENT OF COMPUTER
ENGINEERING.

Project Guide
Prof.Vishakha Kharche
Department of Computer Engineering
Abstract

The Project is based on the Amazon Web Services and using it to deploy a
ArtWorld Website. There are multiple ways to showcase your artwork, you can
either search against the artist name or you can enter the name of artwork, mention the
type of artwork you want to search. Read up about the artist, check their Artworks,
browse the gallery, read the reviews and you can also appreciate it. Learn about
artwork types and their story behind the Paintings. ”ArtWorld” is been developed in
HTML and CSS for the front end of the project.

ii
Acknowledgement

We would take this opportunity to thank our project guide Prof. Vishakha Kharche for
providing timely assistant to our query and guidance that he gave owing to his experience in
this age for past many years. He had indeed been a lighthouse for us in this journey.

iii
INDEX
1 Introduction.............................................................................................................1
2. Overview of Existing System.................................................................................2
3. Limitations of Existing System.............................................................................3
4. Overview of proposed system...............................................................................4
5. Requirements..........................................................................................................5

6. System Analysis.....................................................................................................6
7. Implementation.......................................................................................................7-9

8. Screenshots.........................................................................................................10-12

9. Conclusion...............................................................................................................13

10.References..........................................................................................................14

iv
1. INTRODUCTION

1.1 Introduction

Amazon Web Services (AWS) is a subsidiary of Amazon that provides on- demand
cloud computing platforms and APIs to individuals, companies, and governments, on a
metered pay-as-you-go basis. In aggregate, these cloud computing web services provide
a set of primitive abstract technical infrastructure and distributed computing building
blocks and tools. One of these services is Amazon Elastic Compute Cloud (EC2),
which allows users to have at their disposal a virtual cluster of computers,
available all the time, through the Internet. AWS's version of virtual computers
emulates most of the attributes of a real computer, including hardware central
processing units (CPUs) and graphics processing units (GPUs) for processing;
local/RAM memory; hard-disk/SSD storage; a choice of operating systems; networking;
and pre-loaded application software such as web servers, databases, and customer
relationship management (CRM).

In 2020, AWS comprised more than 212 services


including computing, storage, database, analytics, application services, deployment,
management, mobile, developer tools, and tools for the Internet of Things. The most
popular include EC2 and Amazon Simple Storage Service (Amazon S3). Most services
are not exposed directly to end users, but instead offer functionality through APIs for
developers to use in their applications. Amazon Web Services' offerings are
accessed over HTTP, using the REST architectural style and SOAP protocol
for older APIs and exclusively JSON for newer ones.

Amazon markets AWS to subscribers as a way of obtaining large scale computing


capacity more quickly and cheaply than building an actual physical server farm. All
services are billed based on usage, but each service measures usage in varying ways. As
of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three
competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to
Synergy Group.

right amount of IT resources—for example,

1
2. OVERVIEW OF EXISTING SYSTEM

Cloud computing is the use of computing resources (hardware and software) that are
delivered as a service over a network. Today, cloud computing generates a lot of hype; it’s
both promising and scary. Businesses see its potential but also have many concerns. This
Emerging computing paradigm offers attractive financial and technological advantages.
Although the concept of time-shared remote services isn’t new, cloud computing
infrastructures use new technologies and services, some of which haven’t been fully
evaluated with respect to security. Security is considered one of the most critical aspects in
everyday computing, and it is not different for cloud computing due to the sensitivity and
importance of data stored in the cloud. Cloud computing infrastructures uses new
technologies and services, most which haven’t been fully evaluated with respect to security.
Cloud Computing has several major issues and concerns, such as data security, trust,
expectations, regulations, and performance issues.

2
3. LIMITATIONS OF EXISTING SYSTEM

 Trust
Trust between the Service provider and the customer is one of the main issues cloud
computing faces today. There is no way for the customer to be sure whether the
management of the service is trustworthy, and whether there is any risk of insider
attacks. This is a major issue and has received strong attention by companies.

 Legal Issues
There are several regulatory requirements, privacy laws and data security laws that
cloud systems need to adhere to. One of the major problems with adhering to the
laws is that laws vary from country to country, and users have no control overwhere
their data is physically located.

 Confidentiality
Confidentiality is preventing the improper disclosure of information. Preserving
confidentiality is one of the major issues faced by cloud systems since the
information is stored at a remote location that the Service Provider has full access.

 Authencity
(Integrity and Completeness)Integrity is preventing the improper modification of
information. Preserving Integrity, like confidentiality is another major issue faced by
cloud systems that needs.

3
4. OVERVIEW OF PROPOSED SYSTEM

An EC2 instance is nothing but a virtual server in Amazon Web services terminology. It
stands for Elastic Compute Cloud. It is a web service where an AWS subscriber can request
and provision a compute server in AWS cloud.

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure,
resizable compute capacity in the cloud. It is designed to make web-scale cloud computing
easier for developers. Amazon EC2’s simple web service interface allows you to obtain and
configure capacity with minimal friction. It provides you with complete control of your
computing resources and lets you run on Amazon’s proven computing environment.

One approach to achieve trustworthy computations in cloud infrastructures is to adapt


existing trusted computing solutions to the cloud computing paradigm or to use these
solutions as building blocks in new cloud architecture models. The most prominent approach
to trusted cloud Computing technology will be specified below. This approach delivers a
scalable cloud-computing platform that provides customers with end-to-end security and
end- to end privacy. It will build security into its services in accordance with security best
practices, and documents how to use the security features. It is important that we leverage
these security features and best practices to design an appropriately secure application
environment. Ensuring the confidentiality, integrity, and availability of data is of the utmost.

4
5. REQUIREMENTS

 Hardware:

• Processor: i3 or any other compatible processor

• RAM: 4 GB or more

• Hard disk: 16 GB or more

 Software:

• Google Chrome browser

 Other:
• Folder containing website folder with html ,css files and js files.
• AWS Account

5
6. SYSTEM ANALYSIS

System analysis is the purpose of granting and interfering facts diagnosing problems facts
and using facts to improve the system. A system is asset of components that interacts to
accomplish some purposes:

1. Identify the drawbacks of the existing systems

2. Identify the need of conversion.

Deliverables:

 Completed, functioning small-scale test environment.


 Lab workstations configured to work with the system.
 Functioning back-end (server, v CSA, storage).
 Successful remote scheduling solutions.
 Reliable network communication/configuration.
 Integration with Netlab.

Risks:

 The project could create security holes in the network


 The project could destabilize existing network
 The project may not have sufficient funding

6
7. IMPLEMENTATION

1. Creating AWS account

1. Open the Amazon Web Services home page.


2. Choose Create an AWS Account.
Note: If you signed in to AWS recently, choose Sign in to the Console. If Create a new
AWS account isn't visible, first choose Sign in to a different account, and then
choose Create a new AWS account.
3. Enter your account information, and then choose Continue. Be sure that you enter
your account information correctly, especially your email address. If you enter your
email address incorrectly, you can't access your account.
Important: For professional AWS accounts, it's a best practice to use a corporate email
distribution list (that is, it.admins@example.com) or email box as the email address.
Avoid using an individual's corporate email address (that is, paulo.santos@example.com).
With this practice, your company can retain access to the AWS account even when an
employee changes positions or leaves the company.
4. Choose Personal or Professional.
Note: Personal accounts and professional accounts have the same features and functions.
5. Enter your company or personal information.
Important: For professional AWS accounts, it's a best practice to enter the company phone
number rather than a personal cell phone. Configuring a root account with an individual
email address or a personal phone number can make your account insecure.
6. Read and accept the AWS Customer Agreement.
Note: Be sure that you read and understand the terms of the AWS Customer Agreement.
7. Choose Create Account and

Continue. Add a payment method

On the Payment Information page, enter the information about your payment method, and
then choose Verify and Add.

Note: If you want to use a different billing address for your AWS billing information,
choose Use a new address before you choose Verify and Add.

Important: You cannot proceed with the sign-up process until you add a valid payment
method.

Verify your phone number

7
1. Choose your country or region code from the list.
2. Enter a phone number where you can be reached in the next few minutes.
3. Enter the code displayed in the captcha and then submit.
4. In a few moments, an automated system contacts you.
5. Enter the PIN you receive, and then choose Continue.

Choose an AWS Support plan.

On the Select a Support Plan page, choose one of the available Support plans. For a
description of the available Support plans and their benefits, see Compare AWS Support
Plans.

Wait for account activation

After you choose a Support plan, a confirmation page indicates that your account is being
activated. Accounts are usually activated within a few minutes, but the process might take
up to 24 hours.

You can sign in to your AWS account during this time. The AWS home page might display
a Complete Sign Up button during this time, even if you've completed all the steps in the
sign-up process.

When your account is fully activated, you'll receive a confirmation email. Check your email
and spam folder for the confirmation email. After you receive this email, you have full
access to all AWS services.

2. Create S3 Bucket
1. Login to your console Search for S3 service inside AWS services search box.
2. Select 'create bucket'
3. Choose a bucket name 'name cannot be changed after this step'
4. Choose the region.
5. If you don't want to go through any advanced options proceed by selecting 'create'.

S3 Console Overview

1. S3 Overview Search for a bucket by it's name Number of created buckets.


2. Number of buckets' regions.
3. Sort buckets.

S3 Versioning

1. Versioning is an option which will keep a history of all your files history, you can
edit and save the file and still have all history saved in the history with ability to
restore and check them all.
2. Enable Versioning Select bucket Select properties Click on versioning and enable
it then save.

8
3. Access file different version. AWS S3 Versioning Select bucket Select file Check
all available version from the top 'version dropdown' S3 Permissions In S3 you
can restrict or add your own permissions by using ACL , Bucket Policy or IAM.
4. Bucket policy vs ACL Bucket policy example:
1. Bucket Policy for read access
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "PublicReadGetObject",
"Effect": "Allow",
"Principal": {
"AWS": "*"
},
"Action": "s3:GetObject",
"Resource": "arn:aws:s3:::1234dgmcsp/*"
}

2. Select bucket.
3. Choose permissions tab.
4. Under access control list you can add user and permissions as well as
manage groups.
5. You can make it public and choose everyone can access the bucket and
either read and write or read only.
Upload your files
1. Upload your files by dragging and dropping your files, make sure files are in the
index document location you specified earlier.

Static Website Hosting Property


1. Select properties tab select 'static website hosting'.
2. Choose 'use this bucket to host a website' Index document 'this is the folder
and file name or the default page ex.: index.html..etc'
3. Error document 'specify the error page to show whenever a file not found or any
other error'
4. Redirection rules 'you can setup custom rules to redirect specific pages'
5. Save

9
8. SCREENSHOT

Home Page

10
Description

11
Features

DOWNLOAD

12
CONCLUSION

AWS simplifies website hostingprocess. Features of AWS are as follows:

 Fast processing and immediate results with high security.


 Leveraging AWS’s best in class infrastructure.
 Has Each and every requirement that a Web developer needs.

13
REFERENCES
[1] https://aws.amazon.com/premiumsupport/knowledge-center/?nc2=h_m_ma

[2] Cloud computing for e-governance. White paper, IIIT-Hyderabad,

January 2010. Available online (13 pages).

[3] Demographics of india.

http://en.wikipedia.org/wiki/Demographics_of_ India, April 2010.

[4] Economy of india. http://en.wikipedia.org/wiki/Economy_of_India, April

2010.

[5] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy

H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion

Stoica, and MateiZaharia. Above the clouds: A berkeley view of cloud

computing. Technical Report UCB/EECS-2009-28, EECS Department,

University of California, Berkeley, Feb 2009.

[6] F.M. Aymerich, G. Fenu, and S. Surcis. An approach to a cloud

computing network. Applications of Digital Information and Web

Technologies, 2008. ICADIWT 2008., pages 113 –118, August 2008.

[7] M. Backus. E-governance in Developing Countries. IICD Research Brief, 2001

14

You might also like