Data and Application Secutiry for Distributed Application Hosting Services

Data and Application Secutiry for Distributed Application Hosting Services

Ping Lin, Selcuk Candan
ISBN13: 9781599049373|ISBN10: 1599049376|EISBN13: 9781599049380
DOI: 10.4018/978-1-59904-937-3.ch147
Cite Chapter Cite Chapter

MLA

Lin, Ping, and Selcuk Candan. "Data and Application Secutiry for Distributed Application Hosting Services." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 2187-2220. https://doi.org/10.4018/978-1-59904-937-3.ch147

APA

Lin, P. & Candan, S. (2008). Data and Application Secutiry for Distributed Application Hosting Services. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 2187-2220). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch147

Chicago

Lin, Ping, and Selcuk Candan. "Data and Application Secutiry for Distributed Application Hosting Services." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 2187-2220. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch147

Export Reference

Mendeley
Favorite

Abstract

The cost of creating and maintaining software and hardware infrastructures for delivering web services led to a notable trend toward the use of application service providers (ASPs) and, more generally, distributed application hosting services (DAHSs). The emergence of enabling technologies, such as J2EE and .NET, has contributed to the acceleration of this trend. DAHSs rent out Internet presence, computation power, and data storage space to clients with infrastructural needs. Consequently, they are cheap and effective outsourcing solutions for achieving increased service availability and scalability in the face of surges in demand. However, ASPs and DAHSs operate within the complex, multi-tiered, and open Internet environment and, hence, they introduce many security challenges that have to be addressed effectively to convince customers that outsourcing their IT needs is a viable alternative to deploying complex infrastructures locally. In this chapter, we provide an overview of typical security challenges faced by DAHSs, introduce dominant security mechanisms available at the different tiers in the information management hierarchy, and discuss open challenges

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.