Breaking the Monoliths: Architecting the Cloud-First Approach for Low Latency Critical Applications
DOI:
https://doi.org/10.47941/jts.2416Keywords:
Cloud-first architecture, Monolithic Architectures, Low latency, Strangler Fig pattern, Distributed systems compliance.Abstract
Purpose: This paper introduces the new framework, Phased Parallel Transition Framework (PPTF), to transform monolithic architecture into cloud-first systems. The focus will be on low-latency critical applications while trying to achieve seamless migration without many traditional limitations of different migration strategies so that operational continuity can be achieved for an organization with better scalability and performance.
Methodology: The development of PPTF involved a mixed-method research design, combining a review of existing migration strategies and architectural patterns with empirical analysis of real-world implementations. Data was collected through case studies of enterprises undergoing cloud transitions, performance benchmarks of critical applications, and expert interviews with cloud architects. Information was analyzed using comparative evaluation to identify gaps in current strategies and refine the PPTF structure. The framework was further validated through simulations of latency-critical use cases, ensuring scalability and resilience while balancing performance and cost-efficiency.
Findings: By embedding these strategies and tools within an integrated framework, the research provides recommendations for an organization pursuing a cloud-first strategy. Early assessment suggests that PPTF improves response times, reduces operational risk, and enhances resilience, particularly in applications sensitive to latency.
Unique Contribution to Theory, Practice, and Policy: This work contributes to contemporary architectural practices by introducing PPTF as a transforming approach for cloud-first modernization. To theory, it provides formalization of a structured method to the migration of monolithic systems. In practice, this enables an enterprise to modernize architectures, reduce latency, and unlock innovation opportunities. From the perspective of policy, it gives organizations a pathway to meet the demand of modern applications without breaking continuity and resilience in environments that are critical.
Downloads
References
Abbas Kiani and Nirwan Ansari. Toward hierarchical mobile edge computing: Anauction-based profit maximization approach. IEEE Internet of Things Journal,4(6):2082–2091, 2017.
Bennett, K. H., & Rajlich, V. T. (2000). Software maintenance and evolution. Proceedings of the Conference on The Future of Software Engineering - ICSE '00. doi:10.1145/336512.336534
Charles Ruizhongtai Qi, Li Yi, Hao Su, and Leonidas J Guibas. Pointnet++: Deep hierarchical feature learning on point sets in a metric space. Advances in neural information processing systems, 30, 2017. 4
Chen and M. A. Babar, "Towards an Evidence-Based Understanding of Emergence of Architecture through Continuous Refactoring in Agile Software Development," 2014 IEEE/IFIP Conference on Software Architecture, Sydney, NSW, 2014, pp. 195-204, doi: 10.1109/WICSA.2014.45.
Curity, & Curity. (n.d.). Multi-Region Deployment. Curity Identity Server. https://curity.io/resources/learn/multi-region-deployment/
Dangwal, Nitin & Dewan, Neha & Sachdeva, Sonal. (2016). Testing the Cloud and Testing as a Service. 10.1002/9781118821930.ch28.
Dipankar Raychaudhuri, Kiran Nagaraja, and Arun Venkataramani. Mobili-tyfirst: a robust and trustworthy mobility-centric architecture for the futureinternet. ACM SIGMOBILE Mobile Computing and Communications Review,16(3):2–13, 2012.
Dragoni, N., Giallorenzo, S., Lafuente, A. L., Mazzara, M., Montesi, F., Mustafin, R., & Safina, L. (2017). Microservices: Yesterday, Today, and Tomorrow. Present and Ulterior Software Engineering, 195-216. doi:10.1007/978-3-319-67425-4_12
Embracing Digital Technology: A New Strategic Imperative. (2013). In MIT Sloan Management Review [Report]. https://emergenceweb.com/blog/wp-content/uploads/2013/10/embracing-digital-technology.pdf
Foster, Derek & White, Laurie & Adams, Joshua & Erdil, D. Cenk & Hyman, Harvey & Kurkovsky, Stan & Sakr, Majd & Stott, Lee. (2018). Cloud computing: developing contemporary computer science curriculum for a cloud-first future. 346-347. 10.1145/3197091.3205843.
Friston, Sebastian & Foley, Jim. (2020). Low-Latency Rendering With Dataflow Architectures. IEEE Computer Graphics and Applications. 40. 94-104. 10.1109/MCG.2020.2980183.
Haji, L. M., Zeebaree, S. R., Jacksi, K., & Zeebaree, D. Q. (2018). A State of ArtSurvey for OS Performance Improvement. Science Journal of University ofZakho, 6(3), 118-123.
Hanspeter Pfister, Matthias Zwicker, Jeroen Van Baar, and Markus Gross. Surfels: Surface elements as rendering primitives. In Proceedings of the 27th annual conference on Computer graphics and interactive techniques, pages 335-342, 2000. 1, 2
Holmes KA, Greco SE, Berry AM. Pattern and Process of Fig (Ficus carica) Invasion in a California Riparian Forest. Invasive Plant Science and Management. 2014;7(1):46-58. doi:10.1614/IPSM-D-13-00045.1
Ke Zhang, Yuming Mao, Supeng Leng, Alexey Vinel, and Yan Zhang. Delayconstrained offloading for mobile edge computing in cloud-enabled vehicular net-works. In 2016 8th International Workshop on Resilient Networks Design andModeling (RNDM), pages 288–294. IEEE, 2016.
Khurana, Rahul. (2020). Fraud Detection in eCommerce Payment Systems: The Role of Predictive AI in Real-Time Transaction Security and Risk Management. 10. 1-32.
Liang Tong, Yong Li, and Wei Gao. A hierarchical edge cloud architecture for mo-bile computing. In IEEE INFOCOM 2016-The 35th Annual IEEE InternationalConference on Computer Communications, pages 1–9. IEEE, 2016.
M. Birje, P. Challagidad, R. Goudar and M. Tapale, "Cloud computing review: Concepts technology challenges and security", Int. J. Cloud Comput., vol. 6, no. 1, pp. 32-57, 2017.
M. L. Abbott and M. T. Fisher, The art of scalability: Scalable web architecture, processes, and organizations for the modern enterprise. Addison-Wesley, 2015
Mateus-Coelho, Nuno. (2020). Security in Microservices Architectures.
Megargel, Alan & Shankararaman, Venky & Walker, David. (2020). Migrating from Monoliths to Cloud-Based Microservices: A Banking Industry Example. 10.1007/978-3-030-33624-0_4.
Michael Fitzgerald, Nina Kruschwitz, Didier Bonnit, Michael Welch, Embracing digital technology, 2013.
Nazarov, Alexey. (2020). Processing streams in a monitoring cloud cluster. Russian Technological Journal. 7. 56-67. 10.32362/2500-316X-2019-7-6-56-67.
Nidhi Jain Kansal and Inderveer Chana. Cloud load balancing techniques: Astep towards green computing. IJCSI International Journal of Computer ScienceIssues, 9(1):238–246, 2012.
Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu, Andres Quiroz, and ManishParashar. Peer-to-peer cloud provisioning: Service discovery and load-balancing.In Cloud Computing, pages 195–217. Springer, 2010.
Rajput, R. & Goyal, Drdinesh. (2020). Cloud Computing and Security. 10.1201/9780429276484-12.
Roberts, M., Udernani, R., Newman, S., Sharif, A., Baird, A., Buliani, S., Nagrani, V., Nair, A., Sun, Y., Nanda, S., Jaeger, T., Walker, D., Nadareishvili, I., Schneier, B., Dinh, K., Rajagopalan, R., Johnston, P., Pata, M., Pance, M., … Fowler, M. (2016). Rethinking Application Security With Microservices Architectures. In IEEE (Ed.), Software Architecture (WICSA), 2014 IEEE/IFIP Conference (Vol. 1, pp. 50–57). O’Reilly Media. https://doi.org/10.1109/CloudCom.2015.93 L.
S. Rose, O. Borchert, S. Mitchell, and S. Connelly, Zero trust architecture, en, 2020. DOI: https://doi.org/10.6028/NIST.SP.800-207.
Sun, Y., Nanda, S., & Jaeger, T. (2015). Security-as-a-Service for Microservices-Based Cloud Applications. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). doi:10.1109/cloudcom.2015.93
V. Singh and S. K. Peddoju, “Container-based microservice architecture for cloud applications,” in 2017 International Conference on Computing, Communication and Automation (ICCCA), 2017, pp. 847–852. DOI: 10.1109/CCAA.2017.8229914.
Wuyang Zhang, Jiachen Chen, Yanyong Zhang, and Dipankar Raychaudhuri. To-wards efficient edge cloud augmentation for virtual reality mmogs. In Proceedingsof the Second ACM/IEEE Symposium on Edge Computing, page 8. ACM, 2017.
Xu Chen, Lei Jiao, Wenzhong Li, and Xiaoming Fu. Efficient multi-user compu-tation offloading for mobile-edge cloud computing. IEEE/ACM Transactions onNetworking, 24(5):2795–2808, 2015.
Zebari, I. M., Zeebaree, S. R., & Yasin, H. M. (2019, April). Real time videostreaming from multi-source using client-server for video distribution. In 20194th Scientific International Conference Najaf (SICN) (pp. 109-114). IEEE.
Zeebaree, S. R. M., Cavus, N., & Zebari, D. (2016). Digital Logic CircuitsReduction: A Binary Decision Diagram Based Approach. LAP LAMBERTAcademic Publishing.
Zeebaree, S. R., Haji, L. M., Rashid, I., Zebari, R. R., Ahmed, O. M., Jacksi, K., &Shukur, H. M. (2020). Multicomputer multicore system influence on maximummulti-processes execution time. TEST Engineering & Management, 83(03),14921-14931.
Zeebaree, S., & Zebari, I. (2014). Multilevel client/server peer-to-peer videobroadcasting system. International Journal of Scientific & EngineeringResearch, 5(8), 260-265
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Ashutosh Ahuja
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.