Strategies for Effective Application Deployment and Scaling in Multi-Cloud Environments
DOI:
https://doi.org/10.32628/CSEIT24105457Keywords:
Cloud Security Posture Management (CPSM), Organizations’, Cost-Efficiency, DevOps, AI Applications, Multi-Cloud Adoption, DevOps-Driven, Cloud Deployments, IT Operations, Team Communication, Software Capabilities.Abstract
In order to expedite the process and produce high-calibre software at lightning speed, this study explores a DevOps-driven solution created especially for cloud application deployment. A well-chosen stack of technologies forms the foundation of our approach. The powerful version control system Git guarantees smooth code management and teamwork, allowing developers to work simultaneously and easily roll back to earlier iterations. This covers workflow orchestration strategies, data dissemination strategies, and cloud service selection and combination. Real-world AI applications in various cloud settings are used to develop and evaluate the framework. The suggested solutions' efficacy is assessed using performance indicators including latency, throughput, and cost-efficiency. Businesses may save money and take advantage of the benefits provided by various cloud providers by installing tools, putting procedures in place, and regularly monitoring tools. Additionally, the difficulties in maintaining multi-cloud infrastructure may deter IT operations as multi-cloud adoption becomes more widespread in IT organizations. This article encourages the adaptation of the DevOps paradigm to multi-cloud scenarios by emphasizing how it may simplify and ease application development, delivery, and maintenance. By highlighting how the DevOps methodology may facilitate and streamline application development, delivery, and maintenance, this article promotes its extension to multi-cloud situations. While adopting. By improving team communication and boosting productivity across the software product lifecycle, this strategy enables businesses to automate the delivery of high-quality software capabilities. In order to meet the need for new goods and technology, the study issue illustrates how organizational workloads are shifting towards automation, primarily with relation to cloud-based applications. Ensuring the security of workloads across many cloud platforms is crucial in this trend of multi-cloud deployments so that organizational focus is possible. Disparities in deployment strategies, architecture, tools, and procedures provide difficulties even when security measures may be the same. Cloud Security Posture Management (CPSM) solutions address security visibility, which is made more difficult by the cloud's dynamic nature. As an organization's cloud footprint grows, these solutions are essential for supplying visibility. This thorough examination explores the intricacies of multi-cloud deployments in DevOps, offering insights into the difficulties and tactics used to deal with this environment.
Downloads
References
B. Davie, Ed., J. Gross, A Stateless Transport Tunneling Protocol for Network Virtualization (STT), IETF Draft draft-davie-stt-03.txt, March 12, 2013, 19 pp. .
M. Mahalingam, D. Dutt, K. Duda, et al., VXLAN: A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks, IETF Draft draft-mahalingam-dutt-dcops-vxlan-03.txt, February 22, 2013, 22 pp. . DOI: https://doi.org/10.17487/rfc7348
M. Sridharan, A. Greenberg, N. Venkataramiah, et al., NVGRE: Network Virtualization using Generic Routing Encapsulation, IETF Draft draft-sridharan-virtualization-nvgre-02.txt, February 25, 2013, 17 pp. .
H. Nielsen, S. Thatte, Web services routing protocol, Microsoft (October) (2001). [19] E. Kohler, R. Morris, B. Chen, J. Jannotti, M. Frans Kaashoek, The click modular router, ACM Trans Comput Syst 18 (3) (2000) 263–297. DOI: https://doi.org/10.1145/354871.354874
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, S. Shenker, Middleboxes no longer considered harmful, OSDI (2004).
L. Popa, N. Egi, S. Ratnasamy, I. Stoica, Building extensible networks with rule-based forwarding (RBF), USENIX OSDI (2010).
E. Nordström et al., Serval: an end-host stack for service-centric networking, NSDI (April) (2012)
Zarour, M.; Alhammad, N.; Alenezi, M.; Alsarayrah, K. Devops Process Model Adoption in Saudi Arabia: An Empirical Study. Jordanian J. Comput. Inf. Technol. 2020, 6, 3. DOI: https://doi.org/10.5455/jjcit.71-1580581874
Chen, D., Wu, Q., & Yang, C. (2019). Security and Compliance in Multi-Cloud Environments: A Survey. Cloud Computing Review, 8(2), 45-59.
Furht, B., & Escalante, A. (2021). Handbook of Cloud Computing. Springer.
Gholami, A., Barros, A., & Smith, C. (2020). Distributed AI Workflows: A Survey and Future Directions. Artificial Intelligence Review, 53(3), 245-267.
Kibler, M., Atreya, A., & Singh, S. (2021). Quantum Computing and Its Impact on Artificial Intelligence. Journal of Quantum Computing, 4(2), 102-119.
Kubernetes. (2022). Kubernetes Documentation.
Marinos, A., & Briscoe, G. (2009). Community Cloud Computing. Proceedings of the 1st International Conference on Cloud Computing, 1-9. DOI: https://doi.org/10.1007/978-3-642-10665-1_43
McMahan, H. B., Moore, E., Ramage, D., & Yaroslavtsev, K. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 1273-1282.
R. Kaushik, O. P. Mahela and P. K. Bhatt, "Events Recognition and Power Quality Estimation in Distribution Network in the Presence of Solar PV Generation," 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT), Bhopal, India, 2021, pp. 305-311. DOI: https://doi.org/10.1109/CSNT51715.2021.9509681
Jain, B.B., Upadhyay, H. and Kaushik, R., 2021. Identification and Classification of Symmetrical and Unsymmetrical Faults using Stockwell Transform. Design Engineering, pp.8600-8609.
Alaluna, M., Vial, E., Neves, N., & Ramos, F. M. (2019). Secure multi - cloud network virtualization. Computer Networks, 161, 45 - 60. DOI: https://doi.org/10.1016/j.comnet.2019.06.004
Kritikos, K., Zeginis, C., Iranzo, J., Gonzalez, R. S., Seybold, D., Griesinger, F., & Domaschka, J. (2019). Multi - cloud provisioning of business processes. Journal of Cloud Computing, 8 (1), 1 - 29. DOI: https://doi.org/10.1186/s13677-019-0143-x
Dreibholz, T., Mazumdar, S., Zahid, F., Taherkordi, A., & Gran, E. G. (2019, February). Mobile edge as part of the multi - cloud ecosystem: a performance study. In 2019 27th Euromicro International Conference on Parallel, Distributed and Network - Based Processing (PDP) (pp.59 - 66). IEEE. DOI: https://doi.org/10.1109/EMPDP.2019.8671599
Nazari, Z., Kamandi, A., & Shabankhah, M. (2019, April). An optimal service composition algorithm in multi - cloud environment. In 2019 5th International Conference on Web Research (ICWR) (pp.141 - 151). IEEE. DOI: https://doi.org/10.1109/ICWR.2019.8765266
Alshammari, M. M., Alwan, A. A., Nordin, A., & Al - Shaikhli, I. F. (2017, November). Disaster recovery in single - cloud and multi - cloud environments: Issues and challenges. In 2017 4th IEEE international conference on engineering technologies and applied sciences (ICETAS) (pp.1 - 7). IEEE DOI: https://doi.org/10.1109/ICETAS.2017.8277868
Liu, W., Wang, P., Meng, Y., Zou, G., & Zhang, Z. (2019, December). A novel algorithm for optimizing selection of cloud instance types in multi - cloud environment. In 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS) (pp.167 - 170). IEEE. DOI: https://doi.org/10.1109/ICPADS47876.2019.00033
Hong, J., Dreibholz, T., Schenkel, J. A., & Hu, J. A. (2019). An overview of multi - cloud computing. In Web, Artificial Intelligence and Network Applications: Proceedings of the Workshops of the 33rd International Conference on Advanced Information Networking and Applications (WAINA - 2019) 33 (pp.1055 - 1068). Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-15035-8_103
Tchernykh, A., Miranda - López, V., Babenko, M., Armenta - Cano, F., Radchenko, G., Drozdov, A. Y., & Avetisyan, A. (2019). Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi - cloud storage. Cluster Computing, 22 (4), 1173 - 1185. DOI: https://doi.org/10.1007/s10586-018-02896-9
Downloads
Published
Issue
Section
License
Copyright (c) 2024 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.