{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T05:56:34Z","timestamp":1759730194098,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031569494"},{"type":"electronic","value":"9783031569500"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56950-0_41","type":"book-chapter","created":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:01:57Z","timestamp":1711594917000},"page":"497-514","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Overview of Infrastructure as Code (IaC) with Performance and Availability Assessment on Google Cloud Platform"],"prefix":"10.1007","author":[{"given":"Hongyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Brian","family":"Kishiyama","sequence":"additional","affiliation":[]},{"given":"David","family":"Lopez","sequence":"additional","affiliation":[]},{"given":"Jeong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,29]]},"reference":[{"key":"41_CR1","unstructured":"Ansible Documentation (2023). https:\/\/docs.ansible.com\/ansible\/latest\/index.html. Accessed 3 Dec 2023"},{"key":"41_CR2","unstructured":"Chef Infra Documentation (2023). https:\/\/docs.chef.io\/. Accessed 3 Dec 2023"},{"key":"41_CR3","unstructured":"Puppet Documentation (2023). https:\/\/puppet.com\/docs\/puppet\/latest\/. Accessed 3 Dec 2023"},{"issue":"1","key":"41_CR4","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2022.3212194","volume":"40","author":"J Alonso","year":"2023","unstructured":"Alonso, J., Piliszek, R., Cankar, M.: Embracing IaC through the DevSecOps philosophy: concepts, challenges, and a reference framework. IEEE Softw. 40(1), 56\u201362 (2023). https:\/\/doi.org\/10.1109\/MS.2022.3212194","journal-title":"IEEE Softw."},{"key":"41_CR5","unstructured":"Amazon Web Services. AWS CloudFormation User Guide. Amazon Web Services (2021). https:\/\/docs.aws.amazon.com\/AWSCloudFormation\/latest\/UserGuide\/Welcome.html"},{"issue":"13","key":"41_CR6","doi-asserted-by":"publisher","first-page":"2948","DOI":"10.3390\/math11132948","volume":"11","author":"I Amorim","year":"2023","unstructured":"Amorim, I., Costa, I.: Leveraging searchable encryption through homomorphic encryption: a comprehensive analysis. Mathematics 11(13), 2948 (2023). https:\/\/doi.org\/10.3390\/math11132948","journal-title":"Mathematics"},{"key":"41_CR7","unstructured":"Aviv, I., Gafni, R., Sherman, S., Bertha, A., Sterkin, A., Bega, E.: Cloud infrastructure from python code-breaking the barriers of cloud deployment (2023)"},{"key":"41_CR8","unstructured":"Basher, M.: DevOps: an explorative case study on the challenges and opportunities in implementing Infrastructure as code (2019). https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:umu:diva-161048"},{"key":"41_CR9","unstructured":"Google Cloud. Google Cloud Deployment Manager documentation (2023). https:\/\/cloud.google.com\/deployment-manager\/docs. Accessed 6 Nov 2023"},{"key":"41_CR10","unstructured":"ConfCompCons. About \u2013 Confidential Computing Consortium (2023). https:\/\/confidentialcomputing.io\/about\/"},{"key":"41_CR11","doi-asserted-by":"publisher","unstructured":"de Carvalho, L.R., de Araujo, A.P.F.: Performance comparison of terraform and cloudify as multicloud orchestrators (2020). https:\/\/doi.org\/10.1109\/CCGrid49817.2020.00-55","DOI":"10.1109\/CCGrid49817.2020.00-55"},{"key":"41_CR12","unstructured":"Entrust. 2021 Global Encryption Trends Study (2021). https:\/\/www.entrust.com\/lp\/en\/global-encryption-trends-study"},{"key":"41_CR13","unstructured":"GCP. Shared responsibilities and shared fate on Google Cloud | Architecture Framework (2023). https:\/\/cloud.google.com\/architecture\/framework\/security\/shared-responsibility-shared-fate"},{"key":"41_CR14","unstructured":"GCP_CC. Encryption for Cloud Security (2023). https:\/\/cloud.google.com\/security\/encryption"},{"key":"41_CR15","doi-asserted-by":"publisher","unstructured":"Guerriero, M., Garriga, M., Tamburri, D.A., Palomba, F.: Adoption, support, and challenges of infrastructure-as-code: insights from industry (2019). https:\/\/doi.org\/10.1109\/ICSME.2019.00092. ISSN: 2576-3148","DOI":"10.1109\/ICSME.2019.00092"},{"key":"41_CR16","doi-asserted-by":"publisher","unstructured":"Gupta, M., Chowdary, M.N., Bussa, S., Chowdary, C.K.: Deploying hadoop architecture using ansible and terraform (2021). https:\/\/doi.org\/10.1109\/ISCON52037.2021.9702299","DOI":"10.1109\/ISCON52037.2021.9702299"},{"issue":"1","key":"41_CR17","first-page":"34","volume":"46","author":"MR Hasan","year":"2023","unstructured":"Hasan, M.R., Ansary, M.S.: Cloud infrastructure automation through IaC (infrastructure as code). Int. J. Comput. (IJC) 46(1), 34\u201340 (2023)","journal-title":"Int. J. Comput. (IJC)"},{"key":"41_CR18","unstructured":"HashiCorp. Automate Infrastructure on Any Cloud. https:\/\/developer.hashicorp.com\/terraform. Accessed 23 Feb 2023"},{"key":"41_CR19","unstructured":"KodeKloud. Infrastructure as Code (IaC) Training Roadmap | Kodekloud (2023). https:\/\/kodekloud.com\/learning-path\/iac"},{"key":"41_CR20","unstructured":"Koenig. Master Azure Infrastructure as Code (IaC) - Comprehensive Online Course (2023). https:\/\/www.koenig-solutions.com\/azure-infrastructure-as-code-training"},{"key":"41_CR21","unstructured":"Langford, M.: Top 5 infrastructure as code (IaC) security challenges (2023). https:\/\/www.trendmicro.com\/en_sg\/devops\/22\/g\/infrastructure-as-code-iac-security.html. Section: best practices"},{"key":"41_CR22","doi-asserted-by":"publisher","unstructured":"Lin, J.-K., Lin, W.-T., Wu, J.-L.: Flexible and efficient multi-keyword ranked searchable attribute-based encryption schemes (2023). https:\/\/doi.org\/10.3390\/cryptography7020028","DOI":"10.3390\/cryptography7020028"},{"key":"41_CR23","unstructured":"May, C.J.: Best Practices for Scanning and Securing Infrastructure as Code (IaC) [cheat sheet included] (2023). https:\/\/blog.gitguardian.com\/infrastructure-as-code-security-best-practices-cheat-sheet-inclu"},{"key":"41_CR24","unstructured":"McKenzie, C.: What is polyglot programming? | Definition from TechTarget (2015). https:\/\/www.techtarget.com\/searchsoftwarequality\/definition\/polyglot-programming"},{"issue":"8","key":"41_CR25","doi-asserted-by":"publisher","first-page":"6184","DOI":"10.1109\/JIOT.2021.3110300","volume":"9","author":"F Song","year":"2022","unstructured":"Song, F., Qin, Z., Xue, L., Zhang, J., Lin, X., Shen, X.: Privacy-preserving keyword similarity search over encrypted spatial data in cloud computing. IEEE Internet Things J. 9(8), 6184\u20136198 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3110300","journal-title":"IEEE Internet Things J."},{"key":"41_CR26","unstructured":"Levan, M.: Compare Google cloud deployment manager vs. terraform on GCP (2020). https:\/\/www.techtarget.com\/searchcloudcomputing\/tip\/Compare-Google-Cloud-Deployment-Manager-vs-Terraform-on-GCP. Accessed 01 Nov 2024"},{"key":"41_CR27","doi-asserted-by":"publisher","unstructured":"Nedeltcheva, G.N., Xiang, B., Niculut, L., Benedetto, D.: Challenges towards modeling and generating infrastructure-as-code. In: Companion of the 2023 ACM\/SPEC International Conference on Performance Engineering (ICPE 2023 Companion), pp. 189\u2013193. Association for Computing Machinery, New York (2023). DOI:https:\/\/doi.org\/10.1145\/3578245.3584937","DOI":"10.1145\/3578245.3584937"},{"key":"41_CR28","unstructured":"Google Cloud. Google Cloud Global Locations (2023). https:\/\/cloud.google.com\/about\/locations"},{"key":"41_CR29","unstructured":"Pingen, I.R.: A reflection on the perceived benefits of infrastructure as code (2021)"},{"key":"41_CR30","first-page":"8","volume":"7","author":"Y Qiu","year":"2023","unstructured":"Qiu, Y., et al.: Simplifying cloud management with cloudless computing. Resource 7, 8 (2023)","journal-title":"Resource"},{"key":"41_CR31","unstructured":"Qwiklabs. Google Cloud Skills Boost (2023). https:\/\/www.cloudskillsboost.google"},{"key":"41_CR32","doi-asserted-by":"publisher","unstructured":"Sokolowski, D., Salvaneschi, G.: Towards reliable infrastructure as code (2023). https:\/\/doi.org\/10.1109\/ICSA-C57050.2023.00072","DOI":"10.1109\/ICSA-C57050.2023.00072"},{"key":"41_CR33","doi-asserted-by":"publisher","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy, S&P 2000, Berkeley, CA, USA, pp. 44\u201355. IEEE Computer Society (2000). https:\/\/doi.org\/10.1109\/SECPRI.2000.848445, http:\/\/ieeexplore.ieee.org\/document\/848445\/. ISBN 978-0-7695-0665-4","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"41_CR34","doi-asserted-by":"publisher","unstructured":"Sullivan, D.: Deploying applications with cloud launcher and deployment manager (2019). https:\/\/doi.org\/10.1002\/9781119564409.ch16","DOI":"10.1002\/9781119564409.ch16"},{"key":"41_CR35","unstructured":"Registry Terraform. Terraform-google-modules\/network\/google | firewall-rules Submodule | Terraform Registry (2023). https:\/\/registry.terraform.io\/modules\/terraform-google-modules\/network\/google\/6.0.0\/submodules\/firewall-rules"},{"key":"41_CR36","doi-asserted-by":"publisher","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing (STOC 2009), Bethesda, MD, USA, pp. 169\u2013178. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1536414.1536440","DOI":"10.1145\/1536414.1536440"},{"key":"41_CR37","unstructured":"Udemy. Top Infrastructure as Code Courses Online \u2013 Updated (2023). https:\/\/www.udemy.com\/topic\/infrastructure-as-code\/"},{"key":"41_CR38","unstructured":"Verdet, A., Hamdaqa, M., Da Silva, L., Khomh, F.: Exploring security practices in infrastructure as code: an empirical study (2023)"},{"issue":"10","key":"41_CR39","doi-asserted-by":"publisher","first-page":"10436","DOI":"10.1109\/TKDE.2023.3253883","volume":"35","author":"Z Wang","year":"2023","unstructured":"Wang, Z., et al.: Efficient location-based skyline queries with secure r-tree over encrypted data. IEEE Trans. Knowl. Data Eng. 35(10), 10436\u201310450 (2023). https:\/\/doi.org\/10.1109\/TKDE.2023.3253883","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"41_CR40","unstructured":"Guest Writer. Infrastructure as Code: Challenges and How to Deal With Them (2022). https:\/\/www.iotforall.com\/infrastructure-as-code-challenges"},{"key":"41_CR41","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Rahman, M., Wu, F., Rahman, A.: Quality assurance for infrastructure orchestrators: emerging results from ansible (2023). https:\/\/doi.org\/10.1109\/ICSA-C57050.2023.00073","DOI":"10.1109\/ICSA-C57050.2023.00073"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the Second International Conference on Advances in Computing Research (ACR\u201924)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56950-0_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T03:16:17Z","timestamp":1711595777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56950-0_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031569494","9783031569500"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56950-0_41","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"29 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing Research","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acr2023a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iicser.org\/ACR24","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}