scholarly journals Deploying an Application to Cloud Platform Using Continous Integration and Continous Delivery

Author(s):  
Muhammad Fauzan Albaihaqi ◽  
Anisa Nurul Wilda ◽  
Bambang Sugiantoro

Cloud Computing is the best way for bussiness owner deploy an application to reduce cost issue because it is implement pay as you go concept. Generally, an application on production level or deployed into cloud instance should not have any error or bug. It should be tested and maintain properly. The problem when an application have intensive development that takes more effort to test the application and deploy. So, need a strategy to deploy an application into cloud instance to make the proccess more efficient. Nowadays, Version Control System (VCS) platform provide Continous Integration and Continous Delivery (CI/CD) feature. Users can utilize that platform to perform automated test and deployment easily. This reasearch purposed to examine how to use CI/CD feature and evaluate it in case of deploying web application to Cloud Platform. Researcher use Gitlab wich is provide CI/CD feature for free and deploy the app to Amazon Web Service. The researcher also utilize docker container to accommodate all processes. The result are Continous Integration can improove application quality because most lines of codes are tested using unit or feature test scenario. Using CI/CD feature improove security issue of deployment. Deployment proccess run automatically without human intervention so it will reduce human error factors. This feature also ensure high availability of an application. Deployment proccess will take zero downtime. The application can quickly update without any downtime and configuration. Last, docker container take an important role for deployment of application into cloud instance.

2019 ◽  
Vol 7 (2) ◽  
pp. 167-176
Author(s):  
Rakhmi Khalida ◽  
Adi Muhajirin ◽  
Siti Setiawati

Abstract   Today, web-based applications more accessible because it can be used in various computer platform only by running the web browser. The developers of the website create some applications that are accessible to all people normally by installing the application in the server. Modern web hosting system, in each of the server, manage multiple web applications. Along with the increase in quality when the presence of high availability requirements of a web service then the server load will increase. Each web application has a dependency on one operating system specific versions of packages including intact as well as well as the provisioning system into application problems for the server. Software engineering with Docker container has been recognized by many developers because it is considered as a solution to current trends. In addition, Docker has a simple application deployment process. This research used Docker Container with the result that Docker container can provide solutions to web applications developers who need to perform a maximum spread of Docker application. The analysis of the information systems was used as a research method in developing a Docker container-based application. The result showed Docker Container could increase developer productivity, reduce server load and the storage.   Keywords: Web, App, Docker, Container   Abstrak   Aplikasi berbasis web semakin banyak digunakan karena dapat diakses di berbagai platform komputer hanya dengan menjalankan web browser. Para pengembang website agar aplikasi yang dibuat dapat diakses semua orang biasanya melakukan install aplikasi ke dalam server. Sistem web hosting modern, di dalam setiap servernya, mengelola banyak aplikasi web. Seiring peningkatan kualitas saat hadirnya kebutuhan high availability dari layanan web maka beban server akan meningkat. Masing-masing aplikasi web yang memiliki ketergantungan dengan satu sistem operasi utuh termasuk paket versi tertentu juga serta aplikasi bawaan sistem menjadi masalah untuk server. Software Docker dengan teknik container banyak dilirik para pengembang aplikasi karena dianggap sebagai solusi trend saat ini. sehingga Docker telah memudahkan proses penyebaran aplikasi. Pada penelitian ini akan dilakukan pembahasan teknis kerja Docker Container, melihat teknis kerja Docker Container dapat memberikan solusi pada pengembang aplikasi web yang membutuhkan Docker untuk maksimal melakukan penyebaran aplikasi. Metode penelitian yang digunakan adalah analisis sistem informasi yang telah dikembangkan dan dilakukan penyebaran menggunakan teknologi Docker container. Hasil penelitian yang didapatkan adalah Docker Container dapat meningkatkan produktivitas pengembang, membuat beban server berkurang, dan mengurangi jumlah penyimpanan.   Kata kunci- Web, Aplikasi, Docker, Container


Author(s):  
Thanh-Nhan Luong ◽  
Hanh-Phuc Nguyen ◽  
Ninh-Thuan Truong

The software security issue is being paid great attention from the software development community as security violations have emerged variously. Developers often use access control techniques to restrict some security breaches to software systems’ resources. The addition of authorization constraints to the role-based access control model increases the ability to express access rules in real-world problems. However, the complexity of combining components, libraries and programming languages during the implementation stage of web systems’ access control policies may arise potential flaws that make applications’ access control policies inconsistent with their specifications. In this paper, we introduce an approach to review the implementation of these models in web applications written by Java EE according to the MVC architecture under the support of the Spring Security framework. The approach can help developers in detecting flaws in the assignment implementation process of the models. First, the approach focuses on extracting the information about users and roles from the database of the web application. We then analyze policy configuration files to establish the access analysis tree of the application. Next, algorithms are introduced to validate the correctness of the implemented user-role and role-permission assignments in the application system. Lastly, we developed a tool called VeRA, to automatically support the verification process. The tool is also experimented with a number of access violation scenarios in the medical record management system.


Author(s):  
Yanish Pradhananga ◽  
Pothuraju Rajarajeswari

The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.


Author(s):  
Andrew Prout ◽  
William Arcand ◽  
David Bestor ◽  
Bill Bergeron ◽  
Chansup Byun ◽  
...  

2021 ◽  
Vol 4 (2) ◽  
pp. 270-276
Author(s):  
Stefanus Eko Prasetyo

The rapid development of website-based applications that can be accessed on various computer platforms and smart phones, causing the infrastructure of web application deployment, especially servers, is needed. This causes sometimes the organization needs to invest in a server. With virtualization, companies can create multiple servers on the same machine, and each server functions as an individual machine. Lightweight based virtualization or known as containers is an approach where the host operating system is shared with a virtual server which means that the parent kernel is shared with virtual servers or containers. The method used is an experimental method, this study measures the effect of a particular treatment on a variable with different treatments. Research variables carried out in the lightweight virtualization system research, including: throughput, Average Latency, response time and Dropped Request. The treatments in this study were tested with 100, 200, 250 and 300 connections simultaneously with 1000, 3000, 5000, 7000 requests.The server service design uses container-based virtualization for the webserver with 2.8 Ghz (4 core) Intel Core i7 processor specifications, 2 GB memory, 80 GB M2 SSD storage, and Gigabit Ethernet capable of handling 250 requests simultaneously, but cannot be accessed when handling 300 requests simultaneously.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-21
Author(s):  
Cosmin Avasalcai ◽  
Christos Tsigkanos ◽  
Schahram Dustdar

Edge computing offers the possibility of deploying applications at the edge of the network. To take advantage of available devices’ distributed resources, applications often are structured as microservices, often having stringent requirements of low latency and high availability. However, a decentralized edge system that the application may be intended for is characterized by high volatility, due to devices making up the system being unreliable or leaving the network unexpectedly. This makes application deployment and assurance that it will continue to operate under volatility challenging. We propose an adaptive framework capable of deploying and efficiently maintaining a microservice-based application at runtime, by tackling two intertwined problems: (i) finding a microservice placement across device hosts and (ii) deriving invocation paths that serve it. Our objective is to maintain correct functionality by satisfying given requirements in terms of end-to-end latency and availability, in a volatile edge environment. We evaluate our solution quantitatively by considering performance and failure recovery.


2019 ◽  
Vol 1345 ◽  
pp. 022044
Author(s):  
Lai Xinming ◽  
Wang Haitao ◽  
Zhao Jing ◽  
Zhang Fan ◽  
Zhao Chao ◽  
...  

2015 ◽  
Vol 6 (3) ◽  
pp. 1-25 ◽  
Author(s):  
Hossain Shahriar ◽  
Hisham Haddad ◽  
Vamshee Krishna Devendran

This paper addresses the detection of clickjacking attacks, which is an emerging web application security issue. The authors propose a web application request and response page analysis framework to detect clickjacking attacks. Their framework considers not only inspects visual features related to frame, JavaScript code pattern in details to match with known attack signatures. The proposed approach is able to detect advanced clickjacking attacks such as cursorjacking, double click, and history object-based attacks. The authors evaluate the proposed approach with a set of legitimate and malicious websites. The results indicate that their approach has low false positive and false negative rates. The overhead imposed by the proposed approach is negligible.


Sign in / Sign up

Export Citation Format

Share Document