Files
Thesis/Abstract/abstractenglish.tex
2024-01-10 19:50:33 +02:00

61 lines
3.0 KiB
TeX

\abstractenglish{
% skip indentation just for this paragraph
\textenglish{
\noindent Today, more and more people rely on IaaS services over traditional
on-premise infrastructure to provide operational support to applications,
services and business processes. This is because in this way this way, the
costs of an organization or business are reduced as long as there is no need
expenditure/investment on the purchase of equipment and the operational costs
of using services IaaS is based on flexible billing models based on usage (of
infrastructure resources that offered). In addition, it is possible to scale
the offered remote infrastructure depending on the needs of the organisation
and the current workload of the services and applications to be supported. In
this way, the responsibility for and maintenance of the equipment to third
parties while at the same time introducing a new model of trust between the
user/organisation and the cloud provider. The increase interest by enterprises
in virtualisation technologies which are a key the foundation of IaaS services,
but also the rapid rise in popularity of technologies container technologies
such as Docker has in turn begun to drive the adoption of the architectural
microservices architecture for application development. An architecture based
on both on virtualization technologies for housing applications in cloud
infrastructures and container technologies for partitioning their functions,
providing a an appropriate level of performance and scalability
\footfullcite{awsMicroservices}. However, they remain directly addressable.
security issues that may affect the cloud itself and/or the technologies on
which it is based.
}
\clearpage
\textenglish{
In this paper we will first analyse the security issues related to the cloud
and in particular those related to virtualization and container technologies.
Then, we will analyze how these 2 technologies can be used with more safety
security. But the purpose of the paper goes beyond that and moves to a
practical level, proposing the solution of a tool that can implement in this
way the proposed safe use of these technologies. In particular, this tool does
not not only can create virtual machines across multiple cloud providers but
also harden them in an automated manner. In addition, it is capable of
installing these virtual machines the Docker container machine, which it can
also harden. The main goal of the work is to make it easier for an organization
to install and configure in an automated manner a secure, distributed
environment (pro- host and operation) for the deployment and operation of a
microservices application. This automation lies in the correct configuration of
the tool, which does not require and does not require any special knowledge of
technical or security issues. infrastructure and operating systems.
}
\vskip 60pt
\textenglish{
\noindent \textbf{Keywords:} Cloud, Security, Virtualization, Containers, Micro-services, Automation
}
}
\clearpage % Abstract ended, start a new page