Automated Multi-cloud Operations and Container Orchestration

Author(s):  
Pethuru Raj ◽  
Anupama Raman
2021 ◽  
Vol 11 (2) ◽  
pp. 67-96
Author(s):  
Pethuru Raj Chelliah ◽  
Chellammal Surianarayanan

With the ready availability of appropriate technologies and tools for crafting hybrid clouds, the move towards employing multiple clouds for hosting and running various business workloads is garnering subtle attention. The concept of cloud-native computing is gaining prominence with the faster proliferation of microservices and containers. The faster stability and maturity of container orchestration platforms also greatly contribute towards the cloud-native era. This paper guarantees the following contributions: 1) It describes the key motivations for multi-cloud concept and implementations. 2) It also highlights various key drivers of the multi-cloud paradigm. 3) It presents a brew of challenges that are likely to occur while setting up multi-cloud. 4) It elaborates the proven and potential solution approaches to solve the challenges. The technology-inspired and tool-enabled solution approaches significantly simplify and speed up the adoption of the fast-emerging and evolving multi-cloud concept in the cloud-native era.


2019 ◽  
Vol 7 (1) ◽  
pp. 30-38
Author(s):  
P. Sen ◽  
D.Sarddar . ◽  
S.K. Sinha ◽  
R. Pandit

2020 ◽  
Vol 10 (2) ◽  
pp. 1-4
Author(s):  
Ashok Kumar

The Business continuity plan and strategy provide effective solutions to Multi-cloud and Microservice approach. The business continuity plan helps to maintain backup and disaster recovery. It ensures continuous business processes during disasters and emergencies. The business continuity planning methods that include risk assessment, analyze impacts, and entire business continuity strategies.


2019 ◽  
Vol 23 (2) ◽  
pp. 797-836 ◽  
Author(s):  
Seyedeh Yasaman Rashida ◽  
Masoud Sabaei ◽  
Mohammad Mehdi Ebadzadeh ◽  
Amir Masoud Rahmani

Author(s):  
Leonel Moyou Metcheka ◽  
René Ndoundam

AbstractClassical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed steganography by fragmenting the secret message and embedding each secret piece into a distinct cover media. The major interest of this approach is to make the secret message detection extremely difficult. However, these file modifications leave fingerprints which can reveal a secret channel to an attacker. Our contribution is a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction. Two properties contribute to achieve these goals: the files do not undergo any modification while the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties. Information’s are usually hidden inside the cover media. In this work, the covert media is a pointer to information. Therefore the file carries the information without being modified and the only way to access it is to have the key. Experiments show interesting comparison results with remarkable security contributions. The work can be seen as a new open direction for further research in the field.


Sign in / Sign up

Export Citation Format

Share Document