Data and Application Secutiry for Distributed Application Hosting Services

Author(s):  
Ping Lin ◽  
K. Selçuk Candan

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges

2008 ◽  
pp. 2187-2220
Author(s):  
Ping Lin ◽  
Selcuk Candan

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges


Author(s):  
A. Mohamed Divan Masood ◽  
S. K. Muthusundar

<p>The explosive increase of data brings new challenges to the data storage and supervision in cloud settings. These data typically have to be processed in an appropriate fashion in the cloud. Thus, any improved latency may originanimmense loss to the enterprises. Duplication detection plays a very main role in data management. Data deduplication calculates an exclusive fingerprint for each data chunk by using hash algorithms such as MD5 and SHA-1. The designed fingerprint is then comparing against other accessible chunks in a database that dedicates for storing the chunks. As an outcome, Deduplication system improves storage consumption while reducing reliability. Besides, the face of privacy for responsive data also arises while they are outsourced by users to cloud. Aiming to deal with the above security challenges, this paper makes the first effort to honor the notion of distributed dependable Deduplication system. We offer new distributed Deduplication systems with privileged reliability in which the data chunks are distributed across a variety of cloud servers. The protection needs an different of using convergent encryption as in foregoing Deduplication systems.</p>


Coronaviruses ◽  
2021 ◽  
Vol 01 ◽  
Author(s):  
Gaurav Dhiman

: In this letter, the psychological impact of COVID-19 on cancer infected patients is discussed. Cancer is a serious health-related problem in the human body nowadays. The 2019 pandemic of coronavirus disease has developed into an unheard-of pandemic. Given the havoc wreaked by this pathogen worldwide, many countries have implemented a severe, legally enforced method of social distancing, in the form of a lockdown. Unless adequate preventive measures are taken, the cost of the pandemic and subsequent lockdown can prove to be irreparable. The obvious consequences of this lockout, such as the escalating levels of unemployment, imminent economic crisis, and extreme food scarcity faced by the sudden unemployed migrant labour population, have been widely reported. Cancer patients are a highly vulnerable group even during non-pandemic periods, often presenting late in the course of their illness, without the services required to avail recommended care. The incidence of psychological complications and emotional distress is considerably higher than in the general population, and the trauma of both the pandemic and subsequent lockdown contributes significantly to their mental trauma. This analysis is geared at solving the challenges faced by cancer patients in the face of this pandemic and subsequent lockdown, with a look at potential solutions that can be enforced.


2014 ◽  
Vol 652 (1) ◽  
pp. 206-221
Author(s):  
Anton Harber

Two decades of contestation over the nature and extent of transformation in the South African news media have left a sector different in substantive ways from the apartheid inheritance but still patchy in its capacity to fill the democratic ideal. Change came fast to a newly open broadcasting sector, but has faltered in recent years, particularly in a public broadcaster troubled by political interference and poor management. The potential of online media to provide much greater media access has been hindered by the cost of bandwidth. Community media has grown but struggled to survive financially. Print media has been aggressive in investigative exposé, but financial cutbacks have damaged routine daily coverage. In the face of this, the government has turned its attention to the print sector, demanding greater—but vaguely defined—transformation and threatened legislation. This has met strong resistance.


2014 ◽  
Vol 108 (1) ◽  
pp. 1-40 ◽  
Author(s):  
Nico Krisch

The consensual structure of the international legal order, with its strong emphasis on the sovereign equality of states, has always been somewhat precarious. In different waves over the centuries, it has been attacked for its incongruence with the realities of inequality in international politics, for its tension with ideals of democracy and human rights, and for standing in the way of more effective problem solving in the international community. While surprisingly resilient in the face of such challenges, the consensual structure has seen renewed attacks in recent years. In the 1990s, those attacks were mainly “moral” in character. They were related to the liberal turn in international law, and some of them, under the banner of human rights, aimed at weakening principles of nonintervention and immunity. Others, starting from the idea of an emerging “international community,” questioned the prevailing contractual models of international law and emphasized the rise of norms and processes reflecting community values rather than individual state interests. Since the beginning of the new millennium, the focus has shifted, and attacks are more often framed in terms of effectiveness or global public goods. Classical international law is regarded as increasingly incapable of providing much-needed solutions for the challenges of a globalized world; as countries become ever more interdependent and vulnerable to global challenges, an order that safeguards states’ freedoms at the cost of common policies is often seen as anachronistic. According to this view, what is needed—and what we are likely to see—is a turn to nonconsensual lawmaking mechanisms, especially through powerful international institutions with majoritarian voting rules.


Computers ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 142
Author(s):  
Obadah Hammoud ◽  
Ivan Tarkhanov ◽  
Artyom Kosmarski

This paper investigates the problem of distributed storage of electronic documents (both metadata and files) in decentralized blockchain-based b2b systems (DApps). The need to reduce the cost of implementing such systems and the insufficient elaboration of the issue of storing big data in DLT are considered. An approach for building such systems is proposed, which allows optimizing the size of the required storage (by using Erasure coding) and simultaneously providing secure data storage in geographically distributed systems of a company, or within a consortium of companies. The novelty of this solution is that we are the first who combine enterprise DLT with distributed file storage, in which the availability of files is controlled. The results of our experiment demonstrate that the speed of the described DApp is comparable to known b2c torrent projects, and subsequently justify the choice of Hyperledger Fabric and Ethereum Enterprise for its use. Obtained test results show that public blockchain networks are not suitable for creating such a b2b system. The proposed system solves the main challenges of distributed data storage by grouping data into clusters and managing them with a load balancer, while preventing data tempering using a blockchain network. The considered DApps storage methodology easily scales horizontally in terms of distributed file storage and can be deployed on cloud computing technologies, while minimizing the required storage space. We compare this approach with known methods of file storage in distributed systems, including central storage, torrents, IPFS, and Storj. The reliability of this approach is calculated and the result is compared to traditional solutions based on full backup.


eLife ◽  
2021 ◽  
Vol 10 ◽  
Author(s):  
Brendan Cornwell ◽  
Katrina Armstrong ◽  
Nia S Walker ◽  
Marilla Lippert ◽  
Victor Nestor ◽  
...  

Climate change is dramatically changing ecosystem composition and productivity, leading scientists to consider the best approaches to map natural resistance and foster ecosystem resilience in the face of these changes. Here we present results from a large-scale experimental assessment of coral bleaching resistance, a critical trait for coral population persistence as oceans warm, in 221 colonies of the coral Acropora hyacinthus across 37 reefs in Palau. We find that bleaching resistant individuals inhabit most reefs but are found more often in warmer microhabitats. Our survey also found wide variation in symbiont concentration among colonies, and that colonies with lower symbiont load tended to be more bleaching resistant. By contrast, our data show that low symbiont load comes at the cost of lower growth rate, a tradeoff that may operate widely among corals across environments. Corals with high bleaching resistance have been suggested as a source for habitat restoration or selective breeding in order to increase coral reef resilience to climate change. Our maps show where these resilience corals can be found, but the existence of tradeoffs with heat resistance may suggest caution in unilateral use of this one trait in restoration.


Author(s):  
Vladimir Meikshan ◽  
◽  
Natalia Teslya ◽  

Benefits of using cloud technology are obvious, their application is expanding, as a result, it determines the steady growth of demand. Cloud computing has acquired particular relevance for large companies connected with Internet services, retailing, logistics that generate large volume of business and other information. The use of cloud technologies allows organizing the joint consumption of resources, solving the problems of storing and transferring significant amounts of data. Russian consumer cooperation refers to large territory distributed organizations actively forming their own digital ecosystem. The issue of data storing and processing for consumer coo-peration organizations is very relevant. At the same time, the prices of cloud service providers are significantly different and require solving the problem of minimizing the cost of storing and transferring significant amounts of data. The application of the linear programming method is considered to select the optimal data storage scheme for several cloud service providers having different technical and economic parameters of the package (maximum amount of storage, cost of allocated resources). Mathematical model includes the equation of costs for data storing and transferring and restrictions on the amount of storage, the amount of data and its safety. Software tool that allows to perform numerical calculations is selected Microsoft Excel in combination with the "search for solutions" add-on. In accordance with the mathematical model, the conditions for minimizing the amount of cloud storage costs and the necessary restrictions are established. Initial data are set for three data forming centers, storages of certain size for five cloud service providers and nominal price for information storage and transmission. Calculations of expenses are performed in several variants: without optimization, with the solution of the optimization problem, with price increase by cloud service providers. Results of the calculations confirm the necessity to solve the problem of minimizing the cost of cloud services for corporate clients. The presented model can be expanded for any cost conditions as well as for different areas of cloud applications.


2013 ◽  
Vol 4 (4) ◽  
pp. 1-12 ◽  
Author(s):  
Ray Gibney ◽  
Tom Zagenczyk ◽  
Marick F. Masters

Information Communication Technology (ICT) offers unions a greater capacity to build cohesion and expand membership. An important issue in assessing the potential benefits of ICT is the nature and scope of union members’ use of this technology. Unions must have an Internet presence. Using data from a 2010 Current Population Survey (CPS), the authors examine the extent to which union members have and use computers and the Internet. In addition, the authors review Facebook pages and Twitter accounts established by or for national labor organizations. The authors find that labor union usage of these social networks has not produced anticipated usage by members.


2020 ◽  
Vol 54 (6) ◽  
pp. 108-113
Author(s):  
Sarah Freeman ◽  
Jake Gentle ◽  
Tim Conway

AbstractAs wind generation becomes more prevalent, it is critical that these resources remain secure and, perhaps more significantly, resilient in the face of cyberattacks. Additionally, the remote locations of offshore wind assets increase the cost associated with responding to cyber incidents. Existing risk assessment techniques, such as consequence prioritization and MITRE ATT&CK, can be used by the wind industry to identify potential impacts from cyberattacks. This perspective can then inform cybersecurity investment strategies for greatest impact.


Sign in / Sign up

Export Citation Format

Share Document