scholarly journals Developing an optimized application hosting framework in Clouds

2013 ◽  
Vol 79 (8) ◽  
pp. 1214-1229 ◽  
Author(s):  
Xuanhua Shi ◽  
Hongbo Jiang ◽  
Ligang He ◽  
Hai Jin ◽  
Chonggang Wang ◽  
...  
Keyword(s):  
Author(s):  
Ping Lin ◽  
K. Selçuk Candan

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges


2001 ◽  
Vol 40 (1) ◽  
pp. 193-219 ◽  
Author(s):  
S. G. Hild ◽  
C. Binding ◽  
D. Bourges-Waldegg ◽  
C. Steenkeste

Author(s):  
Andreas Tsagkaropoulos ◽  
Yiannis Verginadis ◽  
Nikos Papageorgiou ◽  
Fotis Paraskevopoulos ◽  
Dimitris Apostolou ◽  
...  

AbstractWhile a multitude of cloud vendors exist today offering flexible application hosting services, the application adaptation capabilities provided in terms of autoscaling are rather limited. In most cases, a static adaptation action is used having a fixed scaling response. In the cases that a dynamic adaptation action is provided, this is based on a single scaling variable. We propose Severity, a novel algorithmic approach aiding the adaptation of cloud applications. Based on the input of the DevOps, our approach detects situations, calculates their Severity and proposes adaptations which can lead to better application performance. Severity can be calculated for any number of application QoS attributes and any type of such attributes, whether bounded or unbounded. Evaluation with four distinct workload types and a variety of monitoring attributes shows that QoS for particular application categories is improved. The feasibility of our approach is demonstrated with a prototype implementation of an application adaptation manager, for which the source code is provided.


Author(s):  
Michael Rosemann ◽  
Amelia A. Maurizio

This chapter focuses on the most popular enterprise system — SAP — and summarizes the outcomes of a global survey on the status quo of SAP-related education. Based on feedback of 305 lecturers and more than 700 students, it reports on the main factors of Enterprise Sys-tems education including, critical success factors, alternative hosting models, and students’ perceptions. The results show among others an overall increasing interest in advanced SAP solutions and international collaboration, and a high satisfaction with the concept of using application hosting centers. Integrating enterprise systems solutions in the curriculum of not only universities but all types of institutes of higher learning has been a major challenge for nearly ten years. Enterprise systems education is surprisingly well documented in a number of papers on information systems education. However, most publications in this area report on the individual experiences of an institution or an academic.


Author(s):  
Michael Rosemann

This chapter discusses the needs and opportunities for teaching comprehensive business applications, Enterprise Systems, in the form of academic distance education courses. Specific factors of the educational market in Enterprise Systems such as high demand, limited resources or the increased importance of Application Hosting Centers will be described. An appropriate learning model will be selected that stresses the role of the lecturer as a moderator. The subject, Process Engineering at Queensland University of Technology, is taken as an example in order to discuss different forms of distance and also collaborative education in Enterprise Systems. The summary includes recommendations and sketches possible future directions.


2021 ◽  
Author(s):  
Andreas Tsagkaropoulos ◽  
Yiannis Verginadis ◽  
Nikos Papageorgiou ◽  
Fotis Paraskevopoulos ◽  
Dimitris Apostolou ◽  
...  

Abstract While a multitude of cloud vendors exist today offering flexible application hosting services, the application adaptation capabilities provided in terms of autoscaling are rather limited. In most cases, a static adaptation action is used having a fixed scaling response. In the cases that a dynamic adaptation action is provided, this is based on a single scaling variable. We propose Severity, a novel algorithmic approach aiding the adaptation of cloud applications. Based on the input of the DevOps, our approach detects situations, calculates their Severity and proposes adaptations which can lead to better application performance. Severity can be calculated for any number of application QoS attributes and any type of such attributes, whether bounded or unbounded. Evaluation with four distinct workload types and a variety of monitoring attributes shows that QoS for particular application categories is improved. The efficacy of our approach is demonstrated with a prototype implementation of an application adaptation manager, for which the source code is provided.


With the unbounded growth in the infrastructures for application hosting, demand from the consumers of the applications and the trade-off between the application availability with cost for application hosting is pushing the application providers towards cloud.The support from the cloud computing towards the application development are the dynamic load balancing, saving cost for energy and in premises hardware dependency. The dynamic load balancing is made possible by the concept of migrations of virtual machines or VMs. The migration includes identification of high loads on specific hosts, identification of possible virtual machines to be migrated and possible target hosts, where the VMs can be migrated. The challenge of migrating the virtual machines from the source to the destination physical hosts is during the migration process the virtual machines are exposed to the network and the other users available or have access to the same communication channels. Also, the virtual machines data to be made live in the target physical system, popularly called the VM images, are treated as regular files before those are live. Hence in the migration cycle, starting from the transfer of the virtual machine image and till the transferred virtual machine is live, there is a gap of security and which needs to be filled. The virtual machine images often contain the application, data generated by the application and data to be consumed by the application. Regardless to mention these three components are critical and must be prevented from the unauthorised access. Hence, a number of research attempts have proposed various schemes to secure the VM images by employing various encryption mechanisms. There methods are criticised for consuming high amount of computing capabilities for encrypting – decrypting VM images and resulting into violation of service level agreements by making the application not available for higher time.Thus, this work proposes a novel method for encrypting a higher volume VM image in less time by deploying a progressive and adaptive encryption method. The work also establishes the thought of the improvement by testing the algorithm in the light of SLA violation reduction compared with existing methods


Sign in / Sign up

Export Citation Format

Share Document