Files
Thesis/Abstract/abstractenglish.tex
2024-01-11 04:48:35 +02:00

60 lines
2.9 KiB
TeX

\abstractenglish{
% skip indentation just for this paragraph
\textenglish{
\noindent Today, more and more people rely on IaaS services over traditional
on-premise infrastructure to provide operational support to applications,
services and business processes. This is because in this way, the costs of an
organization or business are reduced, since there is no need for an investment
on the purchase of equipment. Also, the operational costs of using IaaS
services is based on flexible billing models according to the usage (of the
offered infrastructure resources). In addition, it is possible to scale the
offered remote infrastructure, depending on the needs of the organization and
the current workload of the services and applications to be supported. In this
way, the responsibility for the equipment and its maintenance is transferred to
third parties, while at the same a new model of trust is introduced between the
user/organization and the cloud provider. The increased interest shown by
enterprises for virtualization technologies (which are a key foundation of IaaS
services) in conjunction with the rapid rise in popularity of container
technologies such as Docker, has in turn begun to drive the adoption of the
microservices architecture for application development. An architecture based
on virtualization technologies for hosting applications in cloud
infrastructures and container technologies for partitioning their functions and
thus, providing an appropriate level of performance and scalability
\footfullcite{awsMicroservices}. However, they remain vulnerable to security
issues that may affect the cloud itself and/or the technologies on which it is
based on.
}
\clearpage
\textenglish{
In this paper we will first analyze the security issues related to the cloud
and in particular, those related to virtualization and container technologies.
Then, we will analyze how these 2 technologies can be used in a more secure
manner. However, the purpose of this paper goes beyond that and moves to a
practical level, proposing the solution of a tool that can implement the
proposed safe use of these technologies. In particular, this tool can not only
create virtual machines across multiple cloud providers but also harden them in
an automated manner. In addition, it is capable of installing on these virtual
machines the Docker container engine, which it can also harden. The main goal
of this work is to make it easier for an organization to install and configure
in an automated manner a secure, distributed environment for the deployment and
operation of a microservices application. This automation lies in the correct
configuration of the tool, which does not require any special knowledge of
technical or security issues in regard to infrastructure and operating systems.
}
\vskip 60pt
\textenglish{
\noindent \textbf{Keywords:} Cloud, Security, Virtualization, Containers, Micro-services, Automation
}
}
\clearpage % Abstract ended, start a new page