scholarly journals Containerization of Server Services

2020 ◽  
Vol 3 (1) ◽  
pp. 320-330
Author(s):  
Adam Muc ◽  
Tomasz Muchowski ◽  
Albert Zawadzki ◽  
Adam Szeleziński

AbstractBusinesses are increasingly confronted with server-related problems. More and more, businesses are enabling remote working and need to rely on network services. The provision of network services requires rebuilding the network infrastructure and the way employees are provided with data. Web applications and server services use common dependencies and require a specific network configuration. This often involves collisions between network ports and common dependencies’ configuration. This problem can be solved by separating the conflicting applications into different servers, but this involves the cost of maintaining several servers. Another solution may be to isolate applications with virtual machines, but this involves a significant overhead on server resources, as each virtual machine must be equipped with an operating system. An alternative to virtual machines can be application containerization, which is growing in popularity. Containerization also allows to isolate applications, but operates on the server’s native operating system. This means eliminating the overhead on server resources present in virtual machines. This article presents an example of web application containerization.

Author(s):  
Romulo de Almeida Neves ◽  
Willian Massami Watanabe ◽  
Rafael Oliveira

Context: Widgets are reusable User Interfaces (UIs) components frequently delivered in Web applications.In the web application, widgets implement different interaction scenarios, such as buttons, menus, and text input.Problem: Tests are performed manually, so the cost associated with preparing and executing test cases is high.Objective: Automate the process of generating functional test cases for web applications, using intermediate artifacts of the web development process that structure widgets in the web application. The goal of this process is to ensure the quality of the software, reduce overall software lifecycle time and the costs associated with tests.Method:We elaborated a test generation strategy and implemented this strategy in a tool, Morpheus Web Testing. Morpheus Web Testing extracts widget information from Java Server Faces artifacts to generate test cases for JSF web applications. We conducted a case study for comparing Morpheus Web Testing with a state of the art tool (CrawlJax).Results: The results indicate evidence that the approach Morpheus Web Testing managed to reach greater code coverage compared to a CrawlJax.Conclusion: The achieved coverage values represent evidence that the results obtained from the proposed approach contribute to the process of automated test software engineering in the industry.


Author(s):  
King Tin Lam ◽  
Cho-Li Wang

Web application servers, being today’s enterprise application backbone, have warranted a wealth of J2EE-based clustering technologies. Most of them however need complex configurations and excessive programming effort to retrofit applications for cluster-aware execution. This chapter proposes a clustering approach based on distributed Java virtual machine (DJVM). A DJVM is a collection of extended JVMs that enables parallel execution of a multithreaded Java application over a cluster. A DJVM achieves transparent clustering and resource virtualization, extolling the virtue of single-system-image (SSI). The authors evaluate this approach through porting Apache Tomcat to their JESSICA2 DJVM and identify scalability issues arising from fine-grain object sharing coupled with intensive synchronizations among distributed threads. By leveraging relaxed cache coherence protocols, we are able to conquer the scalability barriers and harness the power of our DJVM’s global object space design to significantly outstrip existing clustering techniques for cache-centric web applications.


2014 ◽  
Vol 530-531 ◽  
pp. 667-670
Author(s):  
Ke Ming Chen

In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.


Computers ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 50
Author(s):  
Ivan ◽  
Vasile ◽  
Dadarlat

Cloud vendors offer a variety of serverless technologies promising high availability and dynamic scaling while reducing operational and maintenance costs. One such technology, serverless computing, or function-as-a-service (FaaS), is advertised as a good candidate for web applications, data-processing, or backend services, where you only pay for usage. Unlike virtual machines (VMs), they come with automatic resource provisioning and allocation, providing elastic and automatic scaling. We present the results from our investigation of a specific serverless candidate, Web Application Programming Interface or Web API, deployed on virtual machines and as function(s)-as-a-service. We contrast these deployments by varying the number of concurrent users for measuring response times and costs. We found no significant response time differences between deployments when VMs are configured for the expected load, and test scenarios are within the FaaS hardware limitations. Higher numbers of concurrent users or unexpected user growths are effortlessly handled by FaaS, whereas additional labor must be invested in VMs for equivalent results. We identified that despite the advantages serverless computing brings, there is no clear choice between serverless or virtual machines for a Web API application because one needs to carefully measure costs and factor-in all components that are included with FaaS.


2021 ◽  
Vol 5 (2(61)) ◽  
pp. 9-14
Author(s):  
Oksana Herasymenko ◽  
Valeriia Bachynska

The object of research is software for financial accounting and distribution of funds in a non-profit charitable foundation using smart contracts of the Ethereum platform. The work is aimed at designing and implementing a software application for a charitable foundation, which allows to exclude the misuse of funds of a non-profit charitable foundation. The paper proposes an implementation of the Ethereum smart contract for the software of a charitable foundation. In the app, users can apply for financial aid or make a charitable donation. The request for financial support is confirmed by administrators to avoid abuse by those seeking help. Anyone who has a crypto wallet can become a sponsor by transferring funds from its account to a selected request. The sponsor remains incognito when making a charitable contribution. After collecting the entire declared amount, the funds are automatically transferred to the crypto wallet of the request’s owner. A smart contract and a corresponding decentralized web application for interacting with it were experimentally deployed, and their joint work was tested. To implement the smart contract, the Solidity programming language was chosen; developed smart contract converted to bytecode using remix. The resulting bytecode is ready to be deployed on the Ethereum platform. Decentralized web application for interacting with the contract is implemented using Web3.js, Vue.js. A rough estimate of the cost of deploying a project on the Ethereum platform has been made. The deployment and operation of smart contracts and web applications comes with a certain overhead, which is most dependent on the cost of ether. However, this is a justified price to pay for the transparency of transactions and the shadowing of the turnover of funds of the charitable foundation. The results of the research can be used as a basis for further transformation into full-fledged software with the ability to submit all reporting documents to the relevant government agencies and sponsors.


2011 ◽  
pp. 2436-2459
Author(s):  
King Tin Lam ◽  
Cho-Li Wang

Web application servers, being today’s enterprise application backbone, have warranted a wealth of J2EE-based clustering technologies. Most of them however need complex configurations and excessive programming effort to retrofit applications for cluster-aware execution. This chapter proposes a clustering approach based on distributed Java virtual machine (DJVM). A DJVM is a collection of extended JVMs that enables parallel execution of a multithreaded Java application over a cluster. A DJVM achieves transparent clustering and resource virtualization, extolling the virtue of single-systemimage (SSI). The authors evaluate this approach through porting Apache Tomcat to our JESSICA2 DJVM and identify scalability issues arising from fine-grain object sharing coupled with intensive synchronizations among distributed threads. By leveraging relaxed cache coherence protocols, we are able to conquer the scalability barriers and harness the power of our DJVM’s global object space design to significantly outstrip existing clustering techniques for cache-centric web applications.


Author(s):  
B. B. Gupta ◽  
Shashank Gupta ◽  
Pooja Chaudhary

This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web applications. Initially, the framework collects the key modules of web application, extracts the suspicious HTML5 strings from the latent injection points and performs the clustering on such strings based on their level of similarity. Further, it detects the injection of malicious HTML5 code in the script nodes of DOM tree by detecting the variation in the HTML5 code embedded in the HTTP response generated. Any variation observed will simply indicate the injection of suspicious script code. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment on the Google Chrome extension. The experimental evaluation of our framework was performed on the platform of real world HTML5 web applications deployed in the cloud platform.


2017 ◽  
Vol 7 (1) ◽  
pp. 1-31 ◽  
Author(s):  
B.B. Gupta ◽  
Shashank Gupta ◽  
Pooja Chaudhary

This article presents a cloud-based framework that thwarts the DOM-based XSS vulnerabilities caused due to the injection of advanced HTML5 attack vectors in the HTML5 web applications. Initially, the framework collects the key modules of web application, extracts the suspicious HTML5 strings from the latent injection points and performs the clustering on such strings based on their level of similarity. Further, it detects the injection of malicious HTML5 code in the script nodes of DOM tree by detecting the variation in the HTML5 code embedded in the HTTP response generated. Any variation observed will simply indicate the injection of suspicious script code. The prototype of our framework was developed in Java and installed in the virtual machines of cloud environment on the Google Chrome extension. The experimental evaluation of our framework was performed on the platform of real world HTML5 web applications deployed in the cloud platform.


2018 ◽  
Vol 7 (4) ◽  
pp. 2391
Author(s):  
L Srinivasa Rao ◽  
I Raviprakash Reddy

The recent growth in the data centre usage and the higher cost of managing virtual machines clearly demands focused research in reducing the cost of managing and migrating virtual machines. The cost of virtual machine management majorly includes the energy cost, thus the best available virtual machine management and migration techniques must have the lowest energy consumption. The management of virtual machine is solely dependent on the number of applications running on that virtual machine, where there is a very little scope for researchers to improve the energy. The second parameter is migration in order to balance the load, where a number of researches are been carried out to reduce the energy consumption. This work addresses the issue of energy consumption during virtual machine migration and proposes a novel virtual machine migration technique with improvement of energy consumption. The novel algorithm is been proposed in two enhancements as VM selection and VM migration, which demonstrates over 47% reduction in energy consumption.  


Author(s):  
Ram Prasad Patnaik ◽  
Dambaru Dhara Nahak

Virtualization is a technology that transforms today’s powerful computer hardware, which was designed to run a single operating system and a single application, to run multiple virtual machine having independent operating system. Many times, we observes that the server resources been underutilized. Virtualization allows us to efficiently utilize the available resources on physical machine. In virtualization environment, different virtualized machines can have different host operating system (i.e. different versions windows, Linux, Solaris etc). The most important concept to understand in virtualization is that, the virtual machines operating systems are independent from physical server operating system. This paper is an attempt to illustrate and appreciate the concept of virtualization and its implementation by using a live case study which we have implemented for one of our leading ETL tool development for a client. Case study elaborates the implementation details about Virtualized DB Clustering and Server Consolidation.


Sign in / Sign up

Export Citation Format

Share Document