0

Cloud Management and Security

eBook

Erschienen am 28.05.2014
CHF 102,10
(inkl. MwSt.)

Download

E-Book Download
Bibliografische Daten
ISBN/EAN: 9781118817063
Sprache: Englisch
Umfang: 240 S., 7.69 MB
Auflage: 1. Auflage 2014
E-Book
Format: PDF
DRM: Adobe DRM

Beschreibung

Written by an expert with over 15 years experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing.

In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples.

Part one presents the main components constituting the Cloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning especially focusing on Cloud security.

Key Features

Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security

Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students

Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice

Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages

Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing

Provides a research roadmap to establish next-generation trustworthy Cloud computing

Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Autorenportrait

Dr. Imad M. AbbadiUniversity of Oxford, UK

Inhalt

Preface ixReferences xii1 Introduction 11.1 Overview 11.2 Cloud definition 21.3 Cloud evolution 31.4 Cloud services 51.5 Cloud deployment types 61.6 Main challenges of Clouds 71.7 Summary 101.8 Exercises 10References 11Part One Cloud management 132Cloud structure 152.1 Introduction 152.2 Infrastructure components 152.3 Cloud Layers 172.4 Cloud relations 232.5 Cloud dynamics 272.6 Data types 272.7 Summary 302.8 Exercises 30References 303Fundamentals of Cloud management 313.1 Introduction 313.2 Clouds management services 323.3 Virtual control center 373.4 Prerequisite input-data for the management services 373.5 Management of user requirements 403.6 Summary 463.7 Exercises 47References 474 Cloud properties 494.1 Introduction 494.2 Adaptability property 504.3 Resilience property 514.4 Scalability property 524.5 Availability property 534.6 Reliability property 534.7 Security and privacy property 544.8 Business model 554.9 Summary 564.10 Exercises 57References 575 Automated management services 595.1 Introduction 595.2 Virtual layer self-managed services 605.3 Virtual services interdependency 655.4 Application layer self-managed services 675.5 Application services interdependency 705.6 Security and privacy by design 715.7 Multi-tier application deployment in the Cloud 735.8 Main challenges and requirements 795.9 Summary 825.10 Exercises 82References 83Part Two Clouds security fundamentals 856Background 876.1 Topics flow 876.2 Trusted Computing 896.3 Summary 97References 977Challenges for establishing trust in Clouds 997.1 Introduction 997.2 Effects of Cloud dynamism on trust relationships 1007.3 Challenges 1037.4 Summary 1057.5 Exercises 105References 1058Establishing trust in Clouds 1078.1 Introduction 1078.2 Organization requirements 1078.3 Framework requirements 1088.4 Device properties 1118.5 Framework architecture 1128.6 Required software agents 1168.7 Framework workflow 1198.8 Discussion and analysis 1258.9 Summary 1268.10 Exercises 127References 1279 Clouds chains of trust 1299.1 Introduction 1299.2 Software agents revision 1309.3 Roots of and chains of trust definition 1309.4 Intra-layer chains of trust 1329.5 Trust across layers 1409.6 Summary 1439.7 Exercises 143References 14310 Provenance in Clouds 14510.1 Introduction 14510.2 Motivating scenarios 14810.3 Log records management and requirements 15010.4 Framework domain architecture 15510.5 Framework software agents 15710.6 Framework workflow 16010.7 Threat analysis 17110.8 Discussion and future directions 17310.9 Exercises 175References 17511 Insiders 17711.1 Introduction 17711.2 Insiders definition 17811.3 Conceptual models 18211.4 Summary 18511.5 Exercises 185References 186Part Three Practical examples 18712 Real life examples 18912.1 Open Stack 18912.2 Amazon web services 19512.3 Component architecture 19712.4 Prototype 20312.5 Summary 209Reference 20913 Case study 21113.1 Scenario 21113.2 Home healthcare architecture in the Cloud 21213.3 Insiders analysis for home healthcare 21213.4 Cloud threats 220References 226

Informationen zu E-Books

Individuelle Erläuterung zu E-Books