MicroApp: Architecting Web Application for Uneven Trustworthiness in Cloud Computing Environment

碩士 === 國立交通大學 === 資訊科學與工程研究所 === 102 === Cloud computing allows web applications to be distributed across multiple nodes around the globe to achieve high scalability and richer functionality. However, a node may be owned by an untrusted third-party, who may be malicious or simply uncompetitive for e...

Full description

Bibliographic Details
Main Authors: Hsu, Yen-Chun, 許晏峻
Other Authors: Wu, Yu-Sung
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/83958595363127179640
Description
Summary:碩士 === 國立交通大學 === 資訊科學與工程研究所 === 102 === Cloud computing allows web applications to be distributed across multiple nodes around the globe to achieve high scalability and richer functionality. However, a node may be owned by an untrusted third-party, who may be malicious or simply uncompetitive for ensuring the reliability and security of the node. Still, a developer may be tempted to deploy applications on untrusted nodes for cost-saving purposes, as a highly trusted node is presumably expensive due to the cost of reliability and security enhancements. Therefore, developers will have to consider the uneven trustworthiness of nodes when deploying applications in cloud. An application can be split into multiple micro applications, each of which corresponds to a different level of security requirement and then be deployed to a node that can meet the corresponding security requirement. This will ensure sensitive information of the application will not be flowed to untrustworthy nodes, while allowing those insensitive parts of the application to utilize the computing power of those nodes. We propose the MicroApp framework to apply the above concept to a web application that was originally developed for traditional on-premises environments. A developer just needs to indicate the security levels in the application’s code and data and the trust levels for the cloud nodes. MicroApp will automatically generate the corresponding micro applications satisfying the security requirements and interconnect them by stateful remote procedure calls to ensure the application functionality is preserved.