Cloud Management and Security.

"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--

Saved in:
Bibliographic Details
Main Author: Abbadi, Imad M.
Format: eBook
Language:English
Published: Hoboken : Wiley, 2014.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Cover; Titlepage; Copyright; About the Author; Preface; Guide to Using this Book; Notes; References; Acknowledgments; Acronyms; 1 Introduction; 1.1 Overview; 1.2 Cloud Definition; 1.3 Cloud Evolution; 1.4 Cloud Services; 1.5 Cloud Deployment Types; 1.6 Main Challenges of Clouds; 1.7 Summary; 1.8 Exercises; References; Part One CLOUD MANAGEMENT; 2 Cloud Structure; 2.1 Introduction; 2.2 Infrastructure Components; 2.3 Cloud Layers; 2.4 Cloud Relations; 2.5 Cloud Dynamics; 2.6 Data Types; 2.7 Summary; 2.8 Exercises; Notes; References; 3 Fundamentals of Cloud Management; 3.1 Introduction.
  • 3.2 Clouds Management Services3.3 Virtual Control Center; 3.4 Prerequisite Input Data for Management Services; 3.5 Management of User Requirements; 3.6 Summary; 3.7 Exercises; Notes; References; 4 Cloud Properties; 4.1 Introduction; 4.2 Adaptability Property; 4.3 Resilience Property; 4.4 Scalability Property; 4.5 Availability Property; 4.6 Reliability Property; 4.7 Security and Privacy Property; 4.8 Business Model; 4.9 Summary; 4.10 Exercises; References; 5 Automated Management Services; 5.1 Introduction; 5.2 Virtual Layer Self-managed Services; 5.3 Virtual Services Interdependency.
  • 5.4 Application Layer Self-managed Services5.5 Application Services Interdependency; 5.6 Security and Privacy by Design; 5.7 Multi-tier Application Deployment in the Cloud; 5.8 Main Challenges and Requirements; 5.9 Summary; 5.10 Exercises; Notes; References; Part Two CLOUD SECURITY FUNDAMENTALS; 6 Background; 6.1 Topics Flow; 6.2 Trusted Computing; 6.3 Summary; Notes; References; 7 Challenges for Establishing Trust in Clouds; 7.1 Introduction; 7.2 Effects of Cloud Dynamism on Trust Relationships; 7.3 Challenges; 7.4 Summary; 7.5 Exercises; References; 8 Establishing Trust in Clouds.
  • 8.1 Introduction8.2 Organization Requirements; 8.3 Framework Requirements; 8.4 Device Properties; 8.5 Framework Architecture; 8.6 Required Software Agents; 8.7 Framework Workflow; 8.8 Discussion and Analysis; 8.9 Summary; 8.10 Exercises; References; 9 Clouds Chains of Trust; 9.1 Introduction; 9.2 Software Agents Revision; 9.3 Roots of and Chains of Trust Definition; 9.4 Intra-layer Chains of Trust; 9.5 Trust Across Layers; 9.6 Summary; 9.7 Exercises; Notes; References; 10 Provenance in Clouds; 10.1 Introduction; 10.2 Motivating Scenarios; 10.3 Log Records Management and Requirements.
  • 10.4 Framework Domain Architecture10.5 Framework Software Agents; 10.6 Framework Workflow; 10.7 Threat Analysis; 10.8 Discussion and Future Directions; 10.9 Summary; 10.10 Exercises; References; 11 Insiders; 11.1 Introduction; 11.2 Insiders Definition; 11.3 Conceptual Models; 11.4 Summary; 11.5 Exercises; References; Part Three PRACTICAL EXAMPLES; 12 Real-Life Examples; 12.1 OpenStack; 12.2 Amazon Web Services; 12.3 Component Architecture; 12.4 Prototype; 12.5 Summary; Notes; References; 13 Case Study; 13.1 Scenario; 13.2 Home Healthcare Architecture in the Cloud.