International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 9, Issue 3 (March 2022), Pages: 133-141

----------------------------------------------

 Original Research Paper

 Title: Secure PAAS environment over hybrid cloud using load-balanced Docker containers

 Author(s): Ahmad Raza Khan *

 Affiliation(s):

 Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Al Majmaah, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0002-5365-9189

 Digital Object Identifier: 

 https://doi.org/10.21833/ijaas.2022.03.015

 Abstract:

The purpose of this research is to provide cloud service providers (CSP) a secure platform that can be accessed for configuring secure, silent software deployment on the hybrid cloud using load-balanced Docker Containers (LBDC) that are configured with different PAAS software solutions. As many researchers in the past have worked on providing PASS platforms using either a public cloud or private cloud less research is carried out on the hybrid cloud systems and researchers who have worked on the hybrid cloud have followed a different approach to providing PAAS to organizations in need but lack in securing the PAAS platform. This research will provide cloud service providers a secure deployment of the PAAS platform for the developers on the go and will reduce the overhead of CSP to deploy the PAAS services from scratch. Compared to the other researcher’s contribution this research work provides a load-balanced containerized secure PASS platform that can be scaled on-demand and be secure while scaling the resources for peak workloads.  The admins of the hybrid cloud can access and deploy the Docker containers based on the requirement laid down by the developers. Once the Admin configures the Docker container with the required PAAS services he can then easily invoke the LBDC in the hybrid cloud and deploy the PAAS platform for the developers to work on in seconds. LBDC’s will help in scalable deployment of Secure PAAS services for different locations and machines simultaneously thus reducing the cost and time required for hybrid virtual machines to get up and running for the development process by the developers of the company. CSP’s can achieve less turnaround time for deployment of secure PAAS environments for organizations. 

 © 2022 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords: Docker, Hybrid cloud, Security, Load balancing, Containers

 Article History: Received 5 October 2021, Received in revised form 3 January 2022, Accepted 7 January 2022

 Acknowledgment 

Dr. Ahmad Raza Khan would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project No. R-2021-278.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Khan AR (2022). Secure PAAS environment over hybrid cloud using load-balanced Docker containers. International Journal of Advanced and Applied Sciences, 9(3): 133-141

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 

 Tables

 Table 1 Table 2 Table 3  

----------------------------------------------    

 References (14)

  1. Bhimani J, Yang J, Yang Z, Mi N, Xu Q, Awasthi M, Pandurangan R, and Balakrishnan V (2016). Understanding performance of I/O intensive containerized applications for NVMe SSDs. In the 35th International Performance Computing and Communications Conference (IPCCC), IEEE, Las Vegas, USA: 1-8. https://doi.org/10.1109/PCCC.2016.7820650   [Google Scholar]
  2. Ferrer AJ, Pérez DG, and González RS (2016). Multi-cloud platform-as-a-service model, functionalities and approaches. Procedia Computer Science, 97: 63-72. https://doi.org/10.1016/j.procs.2016.08.281   [Google Scholar]
  3. Goldman K, Sailer R, Pendarakis D, and Srinivasan D (2010). Scalable integrity monitoring in virtualized environments. In the fifth ACM workshop on Scalable trusted computing, Association for Computing Machinery, Chicago, USA: 73-78. https://doi.org/10.1145/1867635.1867647   [Google Scholar]
  4. Gonzales D, Kaplan JM, Saltzman E, Winkelman Z, and Woods D (2015). Cloud-Trust—A security assessment model for infrastructure as a service (IaaS) clouds. IEEE Transactions on Cloud Computing, 5(3): 523-536. https://doi.org/10.1109/TCC.2015.2415794   [Google Scholar]
  5. Liu Q, Haihong E, and Song M (2020). The design of multi-metric load balancer for Kubernetes. In the International Conference on Inventive Computation Technologies (ICICT), IEEE, Coimbatore, India: 1114-1117. https://doi.org/10.1109/ICICT48043.2020.9112373   [Google Scholar]
  6. Liu Q, Weng C, Li M, and Luo Y (2010). An In-VM measuring framework for increasing virtual machine security in clouds. IEEE Security and Privacy, 8(6): 56-62. https://doi.org/10.1109/MSP.2010.143   [Google Scholar]
  7. Matthias K and Kane SP (2015). Docker: Up & running: Shipping reliable containers in production. O'Reilly Media, Inc., Newton, Massachusetts, USA.   [Google Scholar]
  8. Orzechowski M, Balis B, Pawlik K, Pawlik M, and Malawski M (2018). Transparent deployment of scientific workflows across clouds-Kubernetes approach. In the IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), IEEE, Zurich, Switzerland: 9-10. https://doi.org/10.1109/UCC-Companion.2018.00020   [Google Scholar]
  9. Ren J, Yu G, He Y, and Li GY (2019). Collaborative cloud and edge computing for latency minimization. IEEE Transactions on Vehicular Technology, 68(5): 5031-5044. https://doi.org/10.1109/TVT.2019.2904244   [Google Scholar]
  10. Santikarama I and Arman AA (2016). Designing enterprise architecture framework for non-cloud to cloud migration using TOGAF, CCRM, and CRMM. In the International Conference on ICT for Smart Society, IEEE, Surabaya, Indonesia: 32-37. https://doi.org/10.1109/ICTSS.2016.7792855   [Google Scholar]
  11. Seol J, Jin S, Lee D, Huh J, and Maeng S (2015). A trusted IaaS environment with hardware security module. IEEE Transactions on Services Computing, 9(3): 343-356. https://doi.org/10.1109/TSC.2015.2392099   [Google Scholar]
  12. Tihfon GM, Park S, Kim J, and Kim YM (2016). An efficient multi-task PaaS cloud infrastructure based on Docker and AWS ECS for application deployment. Cluster Computing, 19(3): 1585-1597. https://doi.org/10.1007/s10586-016-0599-0   [Google Scholar]
  13. Yu L, Shen H, Sapra K, Ye L, and Cai Z (2016). CoRE: Cooperative end-to-end traffic redundancy elimination for reducing cloud bandwidth cost. IEEE Transactions on Parallel and Distributed Systems, 28(2): 446-461. https://doi.org/10.1109/TPDS.2016.2578928   [Google Scholar]
  14. Zhao N, Tarasov V, Albahar H, Anwar A, Rupprecht L, Skourtis D, Warke AS, Mohamed M, and Butt AR (2019). Large-scale analysis of the Docker hub dataset. In the International Conference on Cluster Computing (CLUSTER), IEEE, Albuquerque, USA: 1-10. https://doi.org/10.1109/CLUSTER.2019.8891000   [Google Scholar]