Whatever.
This commit is contained in:
@@ -4,26 +4,26 @@
|
|||||||
|
|
||||||
\noindent Today, more and more people rely on IaaS services over traditional
|
\noindent Today, more and more people rely on IaaS services over traditional
|
||||||
on-premise infrastructure to provide operational support to applications,
|
on-premise infrastructure to provide operational support to applications,
|
||||||
services and business processes. This is because in this way, the costs of an
|
services and business processes. That happens because in this way, the costs of
|
||||||
organization or business are reduced, since there is no need for an investment
|
an organization or business are reduced, since there is no need for an upfront
|
||||||
on the purchase of equipment. Also, the operational costs of using IaaS
|
investment on the purchase of equipment. Also, the operational cost when using
|
||||||
services is based on flexible billing models according to the usage (of the
|
IaaS services is based on flexible billing models according to the usage (of
|
||||||
offered infrastructure resources). In addition, it is possible to scale the
|
the offered infrastructure resources). In addition, it is possible to scale the
|
||||||
offered remote infrastructure, depending on the needs of the organization and
|
offered remote infrastructure, depending on the needs of the organization and
|
||||||
the current workload of the services and applications to be supported. In this
|
the current workload of the services and applications to be supported. In this
|
||||||
way, the responsibility for the equipment and its maintenance is transferred to
|
way, the responsibility for the equipment and its maintenance is transferred to
|
||||||
third parties, while at the same a new model of trust is introduced between the
|
third parties, while at the same a new model of trust is introduced between the
|
||||||
user/organization and the cloud provider. The increased interest shown by
|
user/organization and the cloud provider. The increased interest shown by
|
||||||
enterprises for virtualization technologies (which are a key foundation of IaaS
|
enterprises when in comes to virtualization technologies (which are a key
|
||||||
services) in conjunction with the rapid rise in popularity of container
|
foundation of IaaS services) in conjunction with the rapid rise in popularity
|
||||||
technologies such as Docker, has in turn begun to drive the adoption of the
|
of container technologies such as Docker, has in turn begun to drive the
|
||||||
microservices architecture for application development. An architecture based
|
adoption of the microservices architecture for application development. An
|
||||||
on virtualization technologies for hosting applications in cloud
|
architecture based on virtualization technologies for hosting applications in
|
||||||
infrastructures and container technologies for partitioning their functions and
|
cloud infrastructures and container technologies for partitioning their
|
||||||
thus, providing an appropriate level of performance and scalability
|
functions and thus, providing an appropriate level of performance and
|
||||||
\footfullcite{awsMicroservices}. However, they remain vulnerable to security
|
scalability \footfullcite{awsMicroservices}. However, the technologies in
|
||||||
issues that may affect the cloud itself and/or the technologies on which it is
|
question remain vulnerable to security issues that may affect the cloud itself
|
||||||
based on.
|
and/or the technologies on which it is based on.
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -38,13 +38,14 @@ manner. However, the purpose of this paper goes beyond that and moves to a
|
|||||||
practical level, proposing the solution of a tool that can implement the
|
practical level, proposing the solution of a tool that can implement the
|
||||||
proposed safe use of these technologies. In particular, this tool can not only
|
proposed safe use of these technologies. In particular, this tool can not only
|
||||||
create virtual machines across multiple cloud providers but also harden them in
|
create virtual machines across multiple cloud providers but also harden them in
|
||||||
an automated manner. In addition, it is capable of installing on these virtual
|
an automated manner. In addition, it is capable of installing the Docker
|
||||||
machines the Docker container engine, which it can also harden. The main goal
|
container engine on these virtual machines, which it can also harden. The main
|
||||||
of this work is to make it easier for an organization to install and configure
|
goal of this work is to make it easier for an organization to install and
|
||||||
in an automated manner a secure, distributed environment for the deployment and
|
configure in an automated manner a secure, distributed environment for the
|
||||||
operation of a microservices application. This automation lies in the correct
|
deployment and operation of a microservices application. This automation lies
|
||||||
configuration of the tool, which does not require any special knowledge of
|
in the correct configuration of the tool, which does not require any special
|
||||||
technical or security issues in regard to infrastructure and operating systems.
|
knowledge of technical or security issues in regard to infrastructure and
|
||||||
|
operating systems.
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user