0% found this document useful (0 votes)
24 views7 pages

CC Practical

The document outlines a series of experiments focused on virtualization, cloud simulation, cloud security management, and identity management using various tools like VMware, VirtualBox, and AWS. Each experiment includes objectives, software requirements, and detailed procedures for installation and configuration. Key topics covered include installing operating systems, simulating cloud environments, managing cloud security, and implementing identity management practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

CC Practical

The document outlines a series of experiments focused on virtualization, cloud simulation, cloud security management, and identity management using various tools like VMware, VirtualBox, and AWS. Each experiment includes objectives, software requirements, and detailed procedures for installation and configuration. Key topics covered include installing operating systems, simulating cloud environments, managing cloud security, and implementing identity management practices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Experiment 1

Objective: Install Virtual box/VMware Workstation on different OS.

Software Requirement: VMware software and VirtualBox Tool


VMware is virtualization software that helps you to run multiple operating systems in a
single host. VirtualBox is an Oracle tool to provide host-based virtualization. It is used for
installing the operating system on it.

Practical: This experiment is to be performed through portal.

PROCEDURE TO INSTALL

Step 1- Download Link


Link for downloading the software is https://www.vmware.com/products/workstation-
pro/workstationpro-evaluation.html. Download the software for windows. Good thing is that
there is no signup process. Click and download begins. Software is around 541 MB.

Step 2- Download the installer file


It should probably be in the download folder by default, if you have not changed the
settings in your browser. File name should be something like VMware-workstation-full-
15.5.1-15018445.exe. This file name can change depending on the version of the software
currently available for download. But for now, till the next version is available, they will all
be VMware Workstation 15 Pro.

Step 3- Locate the downloaded installer file


For demonstration purpose, I have placed the downloaded installer on my desktop. Find the
installer on your system and double click to launch the application

Step 4- User Access Control (UAC) Warning


Now you should see User Access Control (UAC) dialog box. Click yes to continue.
Initial Splash screen will appear. Wait for the process to complete.

Step 5- VMware Workstation Setup wizard


Now you will see the VMware Workstation setup wizard dialog box. Click next to continue.

Step 6- End User License Agreement


This time you should see the End User License Agreement dialog box. Check -I accept the
terms in the License Agreement box and press next to continue.

Step 7- Custom Setup options


Select the folder in which you would like to install the application. There is no harm in
leaving the defaults as it is. Also select the Enhanced Keyboard Driver check box.
Step 8- User Experience Settings
Next you are asked to select – Check for Updates and Help improve VMware Workstation.
Do as you wish. I normally leave it to defaults that are unchecked.

Step 9- Application Shortcuts preference


Next step is to select the place you want the shortcut icons to be placed on your system to
launch the application. Please select both the options, desktop and start menu and click next.

Step 10- Installation begins


Now you see the begin installation dialog box. Click install to start the installation process.
Below screenshot shows Installation in progress. Wait for this to complete.
At the end you will see the installation complete dialog box. Click finish and you are done with
the installation process. You may be asked to restart your computer. Click on Yes to restart.

Step 11- Launch VMware Workstation


After the installation completes, you should see the VMware Workstation icon on the desktop.
Double click on it to launch the application.

Step 12- License Key


If you see the dialog box asking for license key, click on trial or enter the License
key. Then what you have is the VMware Workstation 15 Pro running on your windows 10
desktop. If you don't have the license key, you will have a 30 day trial.

Step 13- At some point if you decide to buy


At some point of time if you decide to buy the License key, you can enter the License key by
going to Help -> Enter a License Key

You can enter the 25 character license key in the dialog box shown below and OK. Now you
have the license version of the software.

Experiment 2

Aim: Install different OS on VMware.

Software Requirement : VMware/VirtualBox Software and Ubuntu installer.

Steps to create a virtual machine [Ubuntu] in VirtualBox:

1. Open the Oracle VM VirtualBox.


2. Click the New icon or “Ctrl + N” to create a new virtual machine.
3. Enter a name for the new virtual machine. Choose the Type and Version. Note that
VirtualBox automatically changes ‘Type’ to Linux and ‘Version’ to ‘Ubuntu (64 bit)’ if the
name is given as ‘Ubuntu’. Click Next.
4. Select the amount of RAM to use. The ideal amount of RAM will automatically be selected.
Do not increase the RAM into the red section of the slider; keep the slider in the green
section.
5. Accept the default 'Create a virtual hard drive now' and click 'Create' button.
6. Choose the hard disk file type as VDI (VirtualBox Disk Image). Click Next.
7. Click Next to accept the default option ‘Dynamically allocated’ for storage on physical hard
drive.
8. Select the size of the virtual hard disk and click create.
9. The newly created virtual machine will be displayed in the dashboard.
10. Download the ISO file [Ubuntu disk image file]. Latest version of Ubuntu iso file can be
downloaded from the link https://ubuntu.com/download/desktop . Click the Download button.
11. For previous versions, goto http://releases.ubuntu.com . Choose the preferred version of
Ubuntu and download the iso file.
12. To setup the Ubuntu disk image file (iso file) goto settings.
13. Click Storage. Under the “Storage Devices” section click “Empty”.
14. In the Attributes section, click the disk image and then "Choose Virtual Optical Disk File".
15. Browse and select the downloaded iso file. Click ok.
16. Select the newly created virtual machine in the dashboard and click the start button.
17. In the welcome screen, click the “Install Ubuntu” button.
18. Click the 'Continue' button.
19. Make sure the 'Erase disk and install Ubuntu' option is selected and click 'Install Now'
button.
20. Choose the default and click continue.
21. Setup up your profile by creating username and password.
22. After installation is complete, click the 'Restart Now' button and follow the instructions.
23. The Ubuntu OS is ready to use. Login with the username and password.

Experiment 3
Aim : Simulate a cloud scenario using Simulator.

Software Required : CloudSim 3.0.3


Step 1: Set Up Your CloudSim Environment
Before you start stimulating tasks, you must set up your CloudSim environment. Ensure you
have the latest version of CloudSim downloaded and properly configured in your development
setup. You can find the latest version on the official CloudSim GitHub project page.

Step 2: Create a CloudSim Project


Create a new project in your favourite integrated development environment (IDE), which is
Eclipse. Include the necessary CloudSim libraries in your project to access all the cloud
computing simulation functionalities.
import org.cloudbus.cloudsim.*;
import org.cloudbus.cloudsim.core.CloudSim;
Step 3: Initialize the CloudSim Library
Initialize the CloudSim library. This step sets up the simulation environment.
int numUsers = 1;
Calendar calendar = Calendar.getInstance();
boolean traceFlag = false;
CloudSim.init(numUsers, calendar, traceFlag);

Step 4: Define Data Centers and Hosts


Create data centers and hosts. Data centers provide the physical resources, while hosts are the
individual machines within these centers.
Datacenter datacenter0 = createDatacenter("Datacenter_0");
DatacenterBroker broker = createBroker();
int brokerId = broker.getId();

Step 5: Create Virtual Machines (VMs)


Define the characteristics of the virtual machines (VMs) that will run your cloudlets.
int vmid = 0;
int mips = 1000;
long size = 10000; // image size (MB)
int ram = 512; // vm memory (MB)
long bw = 1000;
int pesNumber = 1; // number of cpus
String vmm = "Xen"; // VMM name
Vm vm = new Vm(vmid, brokerId, mips, pesNumber, ram, bw, size, vmm, new
CloudletSchedulerTimeShared());

Step 6: Create Cloudlets (Tasks)


Define the tasks, known as cloudlets, to be simulated. Specify their characteristics such as
length, file size, and output size.
int id = 0;
long length = 400000;
long fileSize = 300;
long outputSize = 300;
UtilizationModel utilizationModel = new UtilizationModelFull();
Cloudlet cloudlet = new Cloudlet(id, length, pesNumber, fileSize, outputSize, utilizationModel,
utilizationModel, utilizationModel);
cloudlet.setUserId(brokerId);

Step 7: Submit VMs and Cloudlets to the Broker


Submit the VMs and cloudlets to the broker to manage their execution.
broker.submitVmList(vmList);
broker.submitCloudletList(cloudletList);

Step 8: Start the Simulation


Start the CloudSim simulation and print the results.
CloudSim.startSimulation();
List<Cloudlet> newList = broker.getCloudletReceivedList();
CloudSim.stopSimulation();
printCloudletList(newList);

Step 9: Analyze the Results


Analyze the simulation results to understand the performance of your tasks (cloudlets) in the
cloud environment. This can help you optimize resource allocation and task scheduling.

Conclusion
Simulating tasks in CloudSim is a powerful way to explore and optimize cloud computing
environments. By following these steps, you can set up and run your own simulations, gaining
valuable insights into the performance of your cloud applications.

Experiment 4
Aim : To study cloud security management.

Cloud security management


Cloud security management involves implementing policies, controls, and technologies to
protect cloud-based systems, data, and infrastructure. Since you're interested in studying this
field, here are some key areas to focus on:

1. Cloud Security Fundamentals


Shared Responsibility Model (who is responsible for what—cloud provider vs. customer)
Cloud service models (IaaS, PaaS, SaaS) and security considerations.
Cloud deployment models (Public, Private, Hybrid, Multi-cloud)
2. Identity & Access Management (IAM)
Role-based access control (RBAC) & least privilege principle
Multi-factor authentication (MFA) & Single Sign-On (SSO)
Identity federation & directory services
3. Data Security in the Cloud
Data encryption (at rest, in transit, and in use)
Key Management Systems (KMS)
Data loss prevention (DLP) and backup strategies
4. Network Security in the Cloud
Firewalls, intrusion detection/prevention systems (IDS/IPS)
Virtual Private Cloud (VPC) and microsegmentation
Secure API gateway & zero trust architecture
5. Security Compliance & Governance
Compliance standards (ISO 27001, NIST, GDPR, HIPAA, SOC 2)
Cloud security best practices (CIS Benchmarks, OWASP Cloud Top 10)
Risk management & security audits
6. Incident Response & Threat Management
Cloud Security Posture Management (CSPM)
Security Information & Event Management (SIEM)
Incident response plans & forensics
7. Cloud Security Tools & Platforms
AWS Security Hub, Microsoft Defender for Cloud, Google Security Command Center
Cloud Access Security Brokers (CASB)
WEKA for data security and analytics

Experiment 5
Aim : To study and implementation of identity management.

Theory:
What is IAM?
AWS Identity and Access Management (IAM) is a web service that helps you securely
control access to AWS resources. With IAM, you can centrally manage permissions that
control which AWS resources users can access. You use IAM to control who is authenticated
(signed in) and authorised (has permissions) to use resources.

IAM features

1.Shared access to your AWS account


You can grant other people permission to administer and use resources in your AWSaccount
without having to share your password or access key.
2.Granular permissions
You can grant different permissions to different people for different resources. For
example, you might allow some users complete access to Amazon Elastic Compute
Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), Amazon
DynamoDB, Amazon Redshift, and other AWS services.
3.Secure access to AWS resources for applications that run on Amazon EC2
You can use IAM features to securely provide credentials for applications that run on
EC2 instances. These credentials provide permissions for your application to access
other AWS resources. Examples include S3 buckets and DynamoDB tables
4.Multi-factor authentication (MFA)
You can add two-factor authentication to your account and to individual users for
extra security. With MFA you or your users must provide not only a password or
access key to work with your account, but also a code from a specially configured
device.
5.Identity federation
You can allow users who already have passwords elsewhere—for example, in your corporate
network or with an internet identity provider—to get temporary access to your AWS account.
6.Identity information for assurance
If you use AWS CloudTrail, you receive log records that include information about those who
made requests for resources in your account. That information is based onIAM identities.
7.Free to use
AWS Identity and Access Management (IAM) and AWS Security Token Service(AWS STS) are
features of your AWS account offered at no additional charge. Youare charged only when you
access other AWS services using your IAM users or AWSSTS temporary security credentials.

What is Amazon S3?


Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry
leading scalability, data availability, security, and performance.

Steps to implement Identity management :


Step 1 : Login in to AWS console
Step 2.Access IAM Dashboard: Navigate to the IAM (Identity and Access
Management)dashboard.
Step 3 : Create user in IAM
Step 4: Set permissions:Choose Attach existing policies directly to assign predefined
permissions policies.
Step 5. Review the specifications of the User
Step 6: Created User Successfully
Step 7: Login to root user account and access the Amazon S3 .
Step 8: Create the bucket
Step 9: Bucket created successfully .
Step 10: Create User2 on IAM
Step 11: Attach policies to user
Step 12: Review the specifications of the User .
Step 13: User2 created successfully .
Step 14: Login to root user account using User2 credentials and access the Amazon S3 .
Step 15: Create the bucket .
Step 16: Failed to create a bucket.

Conclusion : In this experiment, we have studied and implemented Identity and


AccessManagement (IAM) with S3 practices on AWS by creating 2 users, one having read and
write access and the other having read only access for S3.

You might also like