61 lines
3.0 KiB
TeX
61 lines
3.0 KiB
TeX
\abstractenglish{
|
|
% skip indentation just for this paragraph
|
|
\textenglish{
|
|
|
|
\noindent Today, more and more people rely on IaaS services over traditional
|
|
on-premise infrastructure to provide operational support to applications,
|
|
services and business processes. This is because in this way this way, the
|
|
costs of an organization or business are reduced as long as there is no need
|
|
expenditure/investment on the purchase of equipment and the operational costs
|
|
of using services IaaS is based on flexible billing models based on usage (of
|
|
infrastructure resources that offered). In addition, it is possible to scale
|
|
the offered remote infrastructure depending on the needs of the organisation
|
|
and the current workload of the services and applications to be supported. In
|
|
this way, the responsibility for and maintenance of the equipment to third
|
|
parties while at the same time introducing a new model of trust between the
|
|
user/organisation and the cloud provider. The increase interest by enterprises
|
|
in virtualisation technologies which are a key the foundation of IaaS services,
|
|
but also the rapid rise in popularity of technologies container technologies
|
|
such as Docker has in turn begun to drive the adoption of the architectural
|
|
microservices architecture for application development. An architecture based
|
|
on both on virtualization technologies for housing applications in cloud
|
|
infrastructures and container technologies for partitioning their functions,
|
|
providing a an appropriate level of performance and scalability
|
|
\footfullcite{awsMicroservices}. However, they remain directly addressable.
|
|
security issues that may affect the cloud itself and/or the technologies on
|
|
which it is based.
|
|
|
|
}
|
|
|
|
\clearpage
|
|
|
|
\textenglish{
|
|
|
|
In this paper we will first analyse the security issues related to the cloud
|
|
and in particular those related to virtualization and container technologies.
|
|
Then, we will analyze how these 2 technologies can be used with more safety
|
|
security. But the purpose of the paper goes beyond that and moves to a
|
|
practical level, proposing the solution of a tool that can implement in this
|
|
way the proposed safe use of these technologies. In particular, this tool does
|
|
not not only can create virtual machines across multiple cloud providers but
|
|
also harden them in an automated manner. In addition, it is capable of
|
|
installing these virtual machines the Docker container machine, which it can
|
|
also harden. The main goal of the work is to make it easier for an organization
|
|
to install and configure in an automated manner a secure, distributed
|
|
environment (pro- host and operation) for the deployment and operation of a
|
|
microservices application. This automation lies in the correct configuration of
|
|
the tool, which does not require and does not require any special knowledge of
|
|
technical or security issues. infrastructure and operating systems.
|
|
|
|
}
|
|
|
|
\vskip 60pt
|
|
|
|
\textenglish{
|
|
\noindent \textbf{Keywords:} Cloud, Security, Virtualization, Containers, Micro-services, Automation
|
|
}
|
|
|
|
}
|
|
|
|
\clearpage % Abstract ended, start a new page
|