Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1111683.1111849guideproceedingsArticle/Chapter ViewAbstractPublication PagesccgridConference Proceedingsconference-collections
Article

Protection mechanisms for application service hosting platforms

Published: 19 April 2004 Publication History

Abstract

The application service hosting platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared high-performance infrastructure to host different application services (AS), outsourced by application service providers (ASP). In this paper, we focus on the protection of ASHP which has inherent requirement of sharing, openness, and mutual isolation. In contrast to a dedicated server platform, which is analogous with a private house, an ASHP is like an apartment building, involving the 'host' - the ASHP infrastructure, and the 'tenants' - the AS. Strong protection and isolation must be provided between the host and the tenants, as well as between different tenants. Unfortunately, traditional OS architecture and mechanisms are not adequate to provide strong ASHP protection. In this paper we first make the case for a new OS architecture based on the virtual OS technology. We then present three protection mechanisms we have developed in SODA, our ASHP architecture. The mechanisms include: (1) resource isolation between AS; (2) virtual switching and firewalling between AS; and (3) kernelized intrusion detection and logging for each AS. For (3), we have developed a system called Kernort inside the virtual OS kernel. Kernort detects network intrusions in real-time and logs AS activities even when the AS has been compromised. Moreover for the privacy of AS, logs are encrypted by Kernort so that the 'landlord' (namely ASHP owner) cannot view them without authorization. We are applying SODA to iShare, an Internet-based distributed resource sharing platform.

Cited By

View all
  • (2008)GWiQ-PACM SIGOPS Operating Systems Review10.1145/1341312.134133942:1(111-118)Online publication date: 1-Jan-2008
  • (2005)Virtual playgrounds for worm behavior investigationProceedings of the 8th international conference on Recent Advances in Intrusion Detection10.1007/11663812_1(1-21)Online publication date: 7-Sep-2005
  • (2004)CollapsarProceedings of the 13th conference on USENIX Security Symposium - Volume 1310.5555/1251375.1251377(2-2)Online publication date: 13-Aug-2004

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CCGRID '04: Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
April 2004
804 pages
ISBN:078038430X

Publisher

IEEE Computer Society

United States

Publication History

Published: 19 April 2004

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2008)GWiQ-PACM SIGOPS Operating Systems Review10.1145/1341312.134133942:1(111-118)Online publication date: 1-Jan-2008
  • (2005)Virtual playgrounds for worm behavior investigationProceedings of the 8th international conference on Recent Advances in Intrusion Detection10.1007/11663812_1(1-21)Online publication date: 7-Sep-2005
  • (2004)CollapsarProceedings of the 13th conference on USENIX Security Symposium - Volume 1310.5555/1251375.1251377(2-2)Online publication date: 13-Aug-2004

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media