Cloud Computing Solutions

Cloud Computing Solutions
Автор книги: id книги: 2368480     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 23152,3 руб.     (245,45$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Базы данных Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119682028 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

CLOUD COMPUTING SOLUTIONS The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems. This book discusses the evolution of cloud computing through grid computing and cluster computing. It will help researchers and practitioners to understand grid and distributed computing cloud infrastructure, virtual machines, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art cloud computing countermeasures. This book covers the spectrum of cloud computing-related technologies and the wide-ranging contents will differentiate this book from others. The topics treated in the book include: The evolution of cloud computing from grid computing, cluster computing, and distributed systems; Covers cloud computing and virtualization environments; Discusses live migration, database, auditing, and applications as part of the materials related to cloud computing; Provides concepts of cloud storage, cloud strategy planning, and management, cloud security, and privacy issues; Explains complex concepts clearly and covers information for advanced users and beginners. Audience The primary audience for the book includes IT, computer science specialists, researchers, graduate students, designers, experts, and engineers who are occupied with research.

Оглавление

Группа авторов. Cloud Computing Solutions

Table of Contents

List of Tables

List of Illustrations

Guide

Pages

Cloud Computing Solutions. Architecture, Data Storage, Implementation and Security

List of Figures

List of Tables

Foreword

Preface

Acknowledgments

Acronyms

1. BASICS OF CLOUD COMPUTING

1.1 Evolution of Cloud Computing

1.2 Cluster Computing

1.2.1 The Architecture of Cluster Computing Environment

1.2.2 Components of Computer Cluster

1.3 Grid Computing

1.3.1 Grid-Related Technologies

1.3.2 Levels of Deployment

1.3.3 Architecture of Grid Computing Environment

1.3.3.1 Fabric: Interfaces to Local Control

1.3.3.2 Connectivity: Communicating Easily and Securely

1.3.3.3 Resource: Sharing Single Resources

1.3.3.4 Collective: Coordinating Multiple Resources

1.3.3.5 Application Layer

1.3.3.6 Comparison-Based Study of Cluster, Grid and Cloud Computing

1.4 Mobile Computing

1.4.1 Characteristics of Mobile Computing

1.4.2 Characteristics of Mobile Networks

1.5 Summary

EXERCISES

References

2. INTRODUCTION TO CLOUD COMPUTING

2.1 Definition of Cloud Computing

2.2 Characteristics of Cloud

2.2.1 Elasticity and Scalability

2.2.2 Metered and Billing of Service

2.2.3 Self-Service Allocation of Resources

2.2.4 Application Programming Interface (APIs)

2.2.5 Efficiency Measurement Service

2.2.6 Device and Location Interdependency

2.2.7 Customization

2.2.8 Security

2.3 Cloud Computing Environment

2.3.1 Access to Supporting Business Agility

2.3.2 Minimizing Investment Expenditures

2.3.3 Public Cloud Computing Environment

2.3.4 Private Cloud Computing Environment

2.3.5 Hybrid Cloud Computing Environment

2.3.6 Community Cloud Computing Environment

2.4 Cloud Services

2.4.1 Resources as a Service (RaaS)

2.4.2 Infrastructure as a Service (IaaS)

2.4.3 Platform as a Service (PaaS)

2.4.4 Software as a Service (SaaS)

2.4.5 Network as a Service (NaaS)

2.4.6 Desktop as a Service (DaaS/VDI)

2.4.7 Recovery as a Service (DRaaS)

2.5 Security Paradigms and Issues of Cloud Computing

2.6 Major Cloud Service Providers

2.6.1 IaaS CSPs

2.6.2 PaaS CSPs

2.6.3 SaaS CSPs

2.7 Summary

EXERCISES

References

3. ARCHITECTURAL FRAMEWORK FOR CLOUD COMPUTING

3.1 Challenges of Cloud Computing Environment

3.2 Architectural Framework for Cloud Computing

3.2.1 Service-Oriented Architecture (SOA)

3.2.2 SOA Characterization

3.2.3 Life Cycle of Services in SOA

3.2.4 Integrating SOA and the Cloud

3.2.5 Cloud Architecture

3.2.5.1 Cloud Platform Architecture

3.2.5.2 Cloud Application Architecture

3.2.5.3 Framework Constraints

3.3 Architectural Workflow and Co-ordination of Multiple Activities

3.3.1 Characteristics of Workflow

3.3.2 Need for Workflow

3.4 Examples of Workflow Tools

3.5 Summary

EXERCISES

References

4. VIRTUALIZATION ENVIRONMENT IN CLOUD COMPUTING

4.1 Introduction

4.1.1 Need of Virtualization in Cloud Computing Environment

4.1.2 Virtualization versus Traditional Approach

4.2 Virtualization and Virtual Machine

4.2.1 Advantages of Virtualization Technique in Cloud Computing Environment

4.2.2 Category of Virtual Machine

4.2.2.1 System Virtual Machine

4.2.2.2 System Virtual Machine Advantages

4.2.2.3 Process Virtual Machine

4.3 Virtualization Model for Cloud Computing

4.3.1 Distributed Resources of Physical Hosts

4.3.2 Hypervisor Monitoring Environment (HME)

4.3.2.1 Hypervisor

4.3.2.2 Virtualization Layer

4.3.2.3 Virtual Machine (VM)

4.3.2.4 Hypervisor Administrator

4.3.3 Platform Service

4.3.4 Software Service

4.3.5 Broker Service

4.3.6 Business Service

4.4 Categorization of Guest OS Virtualization Techniques

4.4.1 Full Virtualization

4.4.2 Paravirtualization

4.4.3 Hardware-Assisted Virtualization

4.5 Mapping Technique of Virtual Machine to Physical Machine in a Private Cloud

4.6 Drawbacks of Virtualization

4.7 Summary

EXERCISES

References

5. CLASSIFICATION OF VIRTUALIZATION ENVIRONMENT

5.1 Introduction

5.2 Classification

5.2.1 Scheduling-Based Environment

5.2.1.1 Round-Robin Policy

5.2.1.2 Dynamic Round-Robin Policy

5.2.1.3 Stripping Policy

5.2.1.4 Packing Policy

5.2.2 Load Distribution-Based Environment

5.2.2.1 Free CPU Count-Based Policy

5.2.2.2 Radio-Based Load Balancing Policy

5.2.3 Energy-Aware-Based Environment

5.2.3.1 Watts per Core Policy

5.2.3.2 Cost per Core Policy

5.2.4 Operational-Based Environment

5.2.4.1 Migration

5.2.4.2 Live Migration

5.2.5 Distribution Pattern-Based Environment

5.2.5.1 Centralized Distribution

5.2.5.2 Balanced Binary Tree Distribution

5.2.5.3 Unicast Distribution

5.2.5.4 Multicast Distribution

5.2.5.5 Distribution Between Cross Clouds

5.2.5.6 Peer-to-Peer Distribution

5.2.6 Transaction-Based Environment

5.2.6.1 Isolated Guest Operating System-Based Virtualization

5.2.6.2 User Application-Based Virtualization

5.2.6.3 Hypervisor-Based Virtualization Approach

5.3 Summary

EXERCISES

References

6. AN APPROACH TO LIVE MIGRATION OF VIRTUAL MACHINES IN CLOUD COMPUTING ENVIRONMENT

6.1 Introduction

6.2 Need of Live Migration of Virtual Machine

6.3 Advantages of Live Migration

6.4 A Design Approach to Live Migration

6.4.1 Live Migration Process

6.5 Security Issues

6.5.1 Possible Attacks

6.5.2 Solutions

6.6 Summary

EXERCISES

References

7. RELIABILITY ISSUES IN CLOUD COMPUTING ENVIRONMENT

7.1 Introduction

7.1.1 Research Problem Statement

7.1.2 Research Aim

7.1.3 Research Question

7.2 Literature Review

7.2.1 Cloud Service Models

7.2.2 Elements of Reliable Cloud Computing

7.2.3 Cloud Computing Gaps and Concerns. 7.2.3.1 Cloud Service Reliability

7.2.3.2 Security in Cloud Computing

7.2.3.3 Transparency in Cloud Computing

7.2.3.4 Latency

7.2.3.5 Network Convergence Issues

7.2.4 Trends in Cloud Computing

7.3 Reliability Issues in Cloud Computing Research. 7.3.1 Research Methodology

7.3.2 Research Strategy

7.3.3 Data Collection

7.3.4 Sampling

7.3.5 Data Analysis and Findings

7.4 Findings

7.4.1 Lack of Effort to Address Reliability and Availability Issues

7.4.2 Performance Issues

7.4.3 Privacy Issues

7.5 Summary

EXERCISES

References

8. CLOUD DATABASE

8.1 Introduction

8.2 Non-Relational Data Models

8.2.1 Transactions in Cloud Databases

8.2.2 Advantages of Cloud Database

8.3 Heterogeneous Databases in DaaS

8.3.1 Relational and Non-Relational Database

8.3.2 Centralized and Distributed Database

8.3.3 Structured and Unstructured Database

8.3.4 Infrastructure-Based and Infrastructureless Databases

8.3.5 SQL-Based and NoSQL-Based Databases

8.4 Study of a Document-Oriented Cloud Database - MongoDB

8.4.1 Data Model

8.4.2 Replication

8.4.3 Sharding

8.4.4 Architecture

8.4.5 Consistency

8.4.6 Failure Handling

8.5 CAP Theorem for Cloud Database Transaction

8.6 Issues in Live Migration of Databases in Cloud

8.7 Cloud Database Classification Based on Transaction Processing

8.7.1 ACID-Based Cloud Database

8.7.1.1 Characteristics of ACID-Based Cloud Database

8.7.1.2 Challenges of ACID-Based Cloud Database

8.7.2 NoACID-Based Cloud Database

8.7.2.1 Characteristics of NoAcid-Based Cloud Database

8.7.2.2 Challenges of NoACID-Based Cloud Database

8.8 Commercially Available Cloud Database Platform

8.8.1 Amazon Web Services

8.8.2 Microsoft Windows Azure

8.8.3 Google App Engine

8.9 Summary

EXERCISES

References

9. CLOUD-BASED DATA STORAGE

9.1 Relevant Hadoop Tools

9.2 Hadoop Distributed File System (HDFS) 9.2.1 HDFS Architecture

9.2.2 Data Read Process in HDFS

9.2.3 Data Write Process in HDFS

9.2.4 Authority Management of HDFS

9.2.5 Limitations of HDFS

9.3 Data Mining Challenges with Big Data

9.4 MapReduce. 9.4.1 MapReduce Architecture

9.4.2 MapReduce Procedure

9.4.3 Limitations of MapReduce

9.5 Next Generation of MapReduce: YARN

9.5.1 YARN Compared to MapReduce 1.0 (MRv1)

9.5.2 YARN and MapReduce 2.0 (MRv2)

9.5.3 YARN Architecture

9.5.4 Advantages of YARN

9.6 Classification of Data Mining Systems

9.6.1 Classification According to Kind of Databases Mined

9.6.2 Classification According to Kind of Knowledge Mined

9.6.3 Classification According to Kind of Techniques Utilized

9.6.4 Classification According to the Applications Adapted

9.7 Summary

EXERCISES

References

10. AUDITING CONCEPT IN CLOUD COMPUTING

10.1 Introduction

10.2 Data Security in Cloud Computing Environment

10.2.1 Characteristics of a Secure Cloud Computing Environment

10.2.2 Need for Auditing in Cloud Computing Environment

10.2.3 Auditing Background Within Third-Party Service Provider

10.3 Cloud Auditing Outsourcing Life Cycle Phases

10.4 Auditing Classification

10.5 Auditing Service

10.5.1 How Third-Party Service Provider is Enabling Auditing Service

10.5.2 Auditing Process Analysis

10.5.3 Privacy and Integrity

10.5.4 Cloud-Auditing Architecture Analysis

10.6 Summary

EXERCISES

References

11. SECURITY PARADIGMS IN CLOUD COMPUTING

11.1 Security Paradigms and Issues

11.2 Cloud Security Challenges

11.3 Cloud Economics

11.4 Security of Big Data in Cloud

11.4.1 The Biggest Risk: Data Breach

11.4.2 Data Loss

11.4.3 Account or Service Traffic Hijacking

11.4.4 Insecure Interfaces and APIs

11.4.5 Denial of Service

11.4.6 Malicious Insiders

11.4.7 Abuse of Cloud Users

11.4.8 Inadequate Due Diligence

11.4.9 Vulnerabilities in Shared Technology

11.5 Security as a Service in Cloud

11.6 Summary

EXERCISES

References

12. PRIVACY PRESERVATION ISSUES IN CLOUD COMPUTING

12.1 Privacy Issues in Cloud Storage

12.1.1 Encryption Methods

12.1.2 Access Control Mechanisms

12.1.3 Query Integrity/Keyword Searches

12.1.4 Auditability Schemes

12.1.4.1 Remote Data Possession at Untrusted Host

12.1.4.2 Public Verifiability for Storage Security

12.1.4.3 Remote Data Checking Using Provable Data Possession

12.1.4.4 Privacy-Preserving Data Integrity Checking

12.1.4.5 Privacy-Preserving Public Auditability for Storage Security

12.2 Privacy and Security

12.2.1 Performance Unpredictability, Latency and Reliability

12.2.2 Portability and Interoperability

12.2.3 Data Breach Through Fiber-Optic Networks

12.2.4 Data Storage over IP Networks

12.2.5 Data Storage and Security in Cloud

12.3 Threats to Security in Cloud Computing

12.3.1 Basic Security

12.3.2 Network-Level Security

12.3.2.1 DNS Attacks

12.3.2.2 Sniffer Attacks

12.3.2.3 Issue of Reused IP Addresses

12.3.2.4 BGP Prefix Hijacking

12.3.3 Application-Level Security

12.3.3.1 Security Concerns with the Hypervisor

12.3.3.2 Denial-of-Service Attacks

12.3.3.3 Cookie Poisoning

12.3.3.4 Hidden Field Manipulation

12.3.3.5 Backdoor and Debug Options

12.3.3.6 Distributed Denial-of-Service Attacks

12.3.3.7 CAPTCHA Breaking

12.3.3.8 Dictionary Attack

12.3.3.9 Google Hacking

12.4 Security Issues in Cloud Deployment Models

12.4.1 Security Issues in a Public Cloud

12.4.2 Security Issues in a Private Cloud

12.5 Ensuring Security Against Various Types of Attacks

12.6 Survey of Privacy Preservation Using Fuzzy Set and Genetic Algorithm

12.6.1 Fuzzy-Based Approach for Privacy-Preserving Publication of Data

12.6.1.1 Fuzzy-Based Approach for Privacy Preservation of Numerical Attributes

12.6.1.2 Taxonomy-Based Privacy-Preserving Transformation for Categorical Attributes

12.6.2 Privacy-Preserving Fuzzy Association Rules Hiding in Quantitative Data

12.6.3 A Rough Computing-Based Performance Evaluation Approach for Educational Institutions

12.6.3.1 Rough Set on Fuzzy Approximation Space

12.6.3.2 Why Rough Set?

12.6.4 A New Method for Preserving Privacy in Quantitative Association Rules Using Genetic Algorithm

12.6.4.1 Why Are We Using a Genetic Algorithm in Privacy Preservation?

12.6.4.2 Flowchart of Genetic Algorithm

12.6.5 Privacy Preserving in Association Rules Using a Genetic Algorithm

12.7 Summary

EXERCISES

References

13. APPLICATIONS OF WIRELESS SENSOR NETWORK IN CLOUD

13.1 Introduction

13.2 Architectural Issues of Combining Cloud Computing and Wireless Sensor Networks

13.3 Sensor Network Overview

13.3.1 Terminology

13.3.2 Routing Protocols in WSNs

13.4 Application Scenarios

13.4.1 Military Use

13.4.2 Weather Forecasting

13.4.3 Healthcare

13.4.4 Transport Monitoring

13.5 Summary

EXERCISES

References

14. APPLICATIONS OF MOBILE CLOUD COMPUTING

14.1 What is Mobile Cloud Computing?

14.2 The Architecture of Mobile Cloud Computing

14.3 Characteristics of Mobile Cloud Computing

14.4 Advantages of Mobile Cloud Computing

14.5 Mobile Cloud Applications

14.5.1 Mobile Commerce

14.5.2 Mobile Learning

14.5.3 Mobile Healthcare

14.5.4 Mobile Gaming

14.5.5 Mobile Social Network

14.5.6 Multimedia Sharing

14.6 Summary

EXERCISES

References

15. BIG DATA IN CLOUD COMPUTING

15.1 Introduction to Big Data

15.2 Big Data vs. Cloud Computing

15.3 Big Data and the Cloud

15.4 Cloud Computing to Support Big Data

15.4.1 Cloud Storage for Big Data Storage

15.4.2 Cloud Computing for Big Data Processing

15.4.3 Cloud Computing for Big Data Analytics

15.4.4 Cloud Computing for Big Data Sharing and Remote Collaboration

15.5 Opportunities and Challenges

15.5.1 Pros of Putting Big Data in the Cloud

15.5.2 Potential Challenges of Big Data in the Cloud

15.6 Summary

EXERCISES

References

16. CLOUDSIM: A SIMULATOR FOR CLOUD COMPUTING ENVIRONMENT

16.1 Introduction

16.2 Main Features

16.3 CloudSim Architecture

16.3.1 Modeling the Cloud

16.3.2 Modeling the VM Allocation

16.3.3 Modeling the Cloud Market

16.3.4 Modeling the Network Behavior

16.3.5 Modeling a Federation of Clouds

16.3.6 Modeling Dynamic Workloads

16.3.7 Modeling Data Center Power Consumption

16.3.8 Modeling Dynamic Entities Creation

16.4 Design and Implementation of CloudSim

16.5 Setting up Development Environments

16.6 How to Use CloudSim with Eclipse

References

17. OPENFAAS

17.1 Introduction

17.2 OpenFaaS Architecture

17.3 OpenFaaS Installation

17.3.1 Development Environment with Docker Swarm

17.3.2 Multi-Node Cluster with Docker Swarm

17.3.3 Production Environment with Kubernetes

17.3.3.1 Prerequisites / Tool Chain

17.3.3.2 Creating the Kubernetes Cluster

17.3.4 Installing OpenFaaS Using Helm

17.3.5 Install OpenShift

17.4 Considerations

17.5 Operation of OpenFaaS

17.5.1 Setup and Configuration of the OpenFaaS Command Line Tool

17.5.2 OpenFaaS Store

17.5.3 Management and Usage of Functions

17.5.4 Development of Functions

17.5.5 Working with Docker Registries

17.5.6 Web UI

References

18. OPENNEBULA

18.1 Project Goal and Environment

18.2 Set Up Masternode with Frontend. 18.2.1 Install Components

18.2.2 Starting the Frontend

18.3 Set Up Worker Node with KVM

18.3.1 Install Components

18.3.2 Establish an SSH Communication Pipeline between Master and Worker

18.3.3 Network Configuration

18.4 Register Worker Node

18.5 Deploy VM

References

19. OPENSTACK

19.1 OpenStack

19.2 Terminologies in OpenStack

19.3 OpenStack Architecture

19.3.1 Compute (Nova)

19.3.2 Networking (Neuron)

19.3.3 Image

19.3.4 Object Storage (Swift)

19.3.5 Block Storage (Cinder)

19.4 Logical Architecture

19.5 OpenStack Installation Guide

19.5.1 Hardware requirements

19.5.2 Networking requirements

19.6 OpenStack Work

References

20. EUCALYPTUS

20.1 Introduction to Eucalyptus. 20.1.1 Eucalyptus Overview

20.1.2 Eucalyptus Architecture

20.1.3 Eucalyptus Components

20.2 Eucalyptus Installation

20.2.1 System Requirements

20.2.2 Services Placement

20.2.3 Eucalyptus Features

20.2.4 Networking Modes

20.2.5 Install Repositories

20.2.5.1 Software Signing

20.2.5.2 Install Eucalyptus Release Packages

20.3 Configure Eucalyptus

20.4 Amazon Web Services Compatibility

References

Glossary

Authors

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing

.....

This section includes architectural workflow when an application is deployed on the cloud platform. Workflow style is presented here to help you easily understand the steps involved in executing and managing an application. The concept of workflow is not new. Workflow technologies first emerged in the mid-1970s with simple office automation prototypes at Xerox PARC and the Wharton School of the University of Pennsylvania. In the early 1990s, workflow and office automation gained new life.

According to Dave Green and John Evdemon, workflow is defined as follows:

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Cloud Computing Solutions
Подняться наверх