Application Service - Explore the Science & Experts | ideXlab

Scan Science and Technology

Contact Leading Edge Experts & Companies

Application Service

The Experts below are selected from a list of 16182 Experts worldwide ranked by ideXlab platform

Xuxian Jiang – 1st expert on this subject based on the ideXlab platform

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID – Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu

    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a ‘slice’ of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

Dongyan Xu – 2nd expert on this subject based on the ideXlab platform

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID – Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • SODA: a Service-on-demand architecture for Application Service hosting utility platforms
    High Performance Distributed Computing 2003. Proceedings. 12th IEEE International Symposium on, 2003
    Co-Authors: Xuxian Jiang, Dongyan Xu

    Abstract:

    The grid is realizing the vision of providing computation as utility: computational jobs can be scheduled on-demand at grid hosts based on available computational capacity. In this project, we study another emerging usage of grid utility: the hosting of Application Services. Different from a computational job, an Application Service such as an e-Laboratory or an on-line business has longer lifetime, and performs multiple jobs requested by its clients. A Service hosting utility platform (HUP) is formed by a set of hosts in the grid, and multiple Application Services will be hosted on the HUP. SODA is a Service-on-demand architecture that enables on-demand creation of Application Services on a HUP. With SODA, an Application Service will be created in the form of a set of virtual Service nodes; each node is a virtual machine which is physically a ‘slice’ of a real host in the HUP. SODA involves both OS and middleware techniques, and has the following salient capabilities: (1) on-demand Service priming: the image of an Application Service as well as the OS on which it runs will be created on-demand and bootstrapped automatically; (2) better Service isolation: Services sharing the same HUP host are isolated with respect to administration, faults, intrusion, and resources; (3) integrated Service load management: for each Service, a Service switch will be created to direct client requests to appropriate virtual Service nodes. Moreover, the Application Service provider can replace the default request switching policy with a Service-specific policy.

R. Eigenmann – 3rd expert on this subject based on the ideXlab platform

  • Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

  • CCGRID – Protection mechanisms for Application Service hosting platforms
    IEEE International Symposium on Cluster Computing and the Grid 2004. CCGrid 2004., 2004
    Co-Authors: Xuxian Jiang, Dongyan Xu, R. Eigenmann

    Abstract:

    The Application Service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different Application Services (AS), outsourced by Application Service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the ‘host’ – the ASHP infrastructure, and the ‘tenants’ – the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the ‘landlord’ (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.