ubi:Phone is an encrypted VoIP telephony service that uses encrypted packets with Voice-over-IP (VoIP) protocols to establish secure mobile end-to-end communication over the internet, and is developed by UBITECH. Although ubi:Phone as client is an Android based mobile application, the server part of the solution should be made scalable and elastic through Unicorn Cloud Operations Platform, as it is a solution very demanding on resources. Ubi:phone ensures call participants privacy by blocking any kind of interception and eavesdropping attacks through intermediate hardware (e.g., PBXs, servers, routers) and prevents any interception and man-in-the middle attacks. The ubi:Phone service is targeted specifically to mobile devices, using audio codecs and buffer algorithms tuned to the characteristics of mobile networks and push notifications in order to better preserve device battery.
UNICORN Cloud Operations Platform will help Ubi:phone to be deployed over programmable and reconfigurable infrastructure, limit voice latency that is introduced by the computational overhead, monitor and adapt the infrastructure to have a cost efficient deployment and the same time to increase security.
How is UNICORN Cloud Operations Platform helping?
Unicorn Cloud Operations Platform's micro-service paradigm, the technology stack and the suggested Unicorn Compose descriptor, the ubi:Phone service will be described as an elastic microservice, with details about each of its components. The Usage of Unicorn Cloud Operations Platform's design libraries, the service graph editor and the container packaging tool will be used in order to help for the preparation of the application for deployment. Then by using the MultiCloud orchestrator (through the common Dashboard), we will manage the deployment of the elastic application, at first level on a single IaaS, and then we will experiment with multiple IaaS offerings. Therefore ubi:Phone will manage to be deployed over programmable and reconfigurable infrastructure, limit voice latency that is introduced by the computational overhead, monitor and adapt the infrastructure to have a cost efficient deployment and the same time to increase security.