Cargando…

Cloud management and security /

"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Abbadi, Imad M. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Introduction
  • 1.1. Overview
  • 1.2. Cloud Definition
  • 1.3. Cloud Evolution
  • 1.4. Cloud Services
  • 1.5. Cloud Deployment Types
  • 1.6. Main Challenges of Clouds
  • 1.7. Summary
  • 1.8. Exercises
  • References
  • 2. Cloud Structure
  • 2.1. Introduction
  • 2.2. Infrastructure Components
  • 2.2.1. Storage Components
  • 2.2.2. Physical Servers
  • 2.2.3.Network Components
  • 2.3. Cloud Layers
  • 2.3.1. Vertical Slices
  • 2.3.2. Horizontal Slices
  • 2.3.3. Horizontal vs. Vertical Slices
  • 2.3.4. Illustrative Example
  • 2.4. Cloud Relations
  • 2.4.1. Intra-layer Relations
  • 2.4.2. Across-layer Relations
  • 2.5. Cloud Dynamics
  • 2.6. Data Types
  • 2.7. Summary
  • 2.8. Exercises
  • References
  • 3. Fundamentals of Cloud Management
  • 3.1. Introduction
  • 3.2. Clouds Management Services
  • 3.2.1. Application Deployment Scenario
  • 3.2.2. Identifying Cloud Management Services
  • 3.3. Virtual Control Center
  • 3.4. Prerequisite Input Data for Management Services.
  • 3.5. Management of User Requirements
  • 3.5.1. Requirement Management Workflow
  • 3.5.2. Challenges and Requirements
  • 3.5.3. Categories and Delegation of User Requirements
  • 3.5.4. Illustrative Example
  • 3.6. Summary
  • 3.7. Exercises
  • References
  • 4. Cloud Properties
  • 4.1. Introduction
  • 4.2. Adaptability Property
  • 4.3. Resilience Property
  • 4.4. Scalability Property
  • 4.5. Availability Property
  • 4.6. Reliability Property
  • 4.7. Security and Privacy Property
  • 4.8. Business Model
  • 4.9. Summary
  • 4.10. Exercises
  • References
  • 5. Automated Management Services
  • 5.1. Introduction
  • 5.2. Virtual Layer Self-managed Services
  • 5.2.1. Adaptability as a Virtual Service
  • 5.2.2. System Architect as a Virtual Service
  • 5.2.3. Resilience as a Virtual Service
  • 5.2.4. Scalability as a Virtual Service
  • 5.2.5. Availability as a Virtual Service
  • 5.2.6. Reliability as a Virtual Service
  • 5.3. Virtual Services Interdependency.
  • 5.4. Application Layer Self-managed Services
  • 5.4.1. Adaptability as an Application Service
  • 5.4.2. Resilience as an Application Service
  • 5.4.3. Scalability as an Application Service
  • 5.4.4. Availability as an Application Service
  • 5.4.5. Reliability as an Application Service
  • 5.5. Application Services Interdependency
  • 5.6. Security and Privacy by Design
  • 5.7. Multi-tier Application Deployment in the Cloud
  • 5.7.1. Application Architecture
  • 5.7.2. Managed Services Interaction
  • 5.8. Main Challenges and Requirements
  • 5.8.1. Challenges
  • 5.8.2. Requirements
  • 5.9. Summary
  • 5.10. Exercises
  • References
  • 6. Background
  • 6.1. Topics Flow
  • 6.2. Trusted Computing
  • 6.2.1. Introduction
  • 6.2.2. Trusted Platform Module
  • 6.2.3. TCG Main Components
  • 6.2.4. The TP Main Functions
  • 6.2.5. Challenges in TCG Specifications
  • 6.3. Summary
  • References
  • 7. Challenges for Establishing Trust in Clouds
  • 7.1. Introduction.
  • 7.2. Effects of Cloud Dynamism on Trust Relationships
  • 7.2.1. Load Balancing
  • 7.2.2. Horizontal Scaling
  • 7.2.3. Vertical Scaling
  • 7.2.4. Redundancy
  • 7.2.5. Clustering
  • 7.3. Challenges
  • 7.4. Summary
  • 7.5. Exercises
  • References
  • 8. Establishing Trust in Clouds
  • 8.1. Introduction
  • 8.2.Organization Requirements
  • 8.3. Framework Requirements
  • 8.4. Device Properties
  • 8.5. Framework Architecture
  • 8.5.1. Dynamic Domain Concept
  • 8.5.2. Proposed Architecture
  • 8.6. Required Software Agents
  • 8.6.1. Server Agent Functions
  • 8.6.2. Client Agent Functions
  • 8.6.3. Server Agent Initialization
  • 8.6.4. Client Agent Initialization
  • 8.7. Framework Workflow
  • 8.7.1. Management Domain and Collaborating Management Domain Establishment
  • 8.7.2.Organization Home Domain Establishment
  • 8.7.3. Adding Devices to a Domain
  • 8.7.4. Outsourced Domain and Collaborating Outsourced Domain Establishment
  • 8.8. Discussion and Analysis.
  • 8.8.1. Benefits of Using Trusted Computing
  • 8.8.2. Benefits of the Framework Architecture
  • 8.8.3. Content Protection
  • 8.9. Summary
  • 8.10. Exercises
  • References
  • 9. Clouds Chains of Trust
  • 9.1. Introduction
  • 9.2. Software Agents Revision
  • 9.3. Roots of and Chains of Trust Definition
  • 9.3.1. Roots of Trust
  • 9.3.2. Chains of Trust
  • 9.4. Intra-layer Chains of Trust
  • 9.4.1.A Resource Chain of Trust
  • 9.4.2.Compositional Chains of Trust
  • 9.4.3. Physical Layer DCoT and CDCoT
  • 9.4.4. Virtual Layer DCoT and CDCoT
  • 9.4.5. Application Layer DCoT and CDCoT
  • 9.5. Trust Across Layers
  • 9.6. Summary
  • 9.7. Exercises
  • References
  • 10. Provenance in Clouds
  • 10.1. Introduction
  • 10.1.1. Log and Provenance
  • 10.1.2. Problem Description and Objectives
  • 10.1.3.Organization of the Chapter
  • 10.2. Motivating Scenarios
  • 10.3. Log Records Management and Requirements
  • 10.3.1. Database Design
  • 10.3.2. Security Requirements.
  • 10.3.3. Other Requirements and Device Properties
  • 10.4. Framework Domain Architecture
  • 10.5. Framework Software Agents
  • 10.5.1. Cloud Server Agent
  • 10.5.2. LaaS Server Agent
  • 10.5.3. LaaS Client Agent
  • 10.5.4. VM Agent
  • 10.5.5. Cloud Client Agent
  • 10.6. Framework Workflow
  • 10.6.1. Cloud Server Agent Initialization
  • 10.6.2. LaaS Server Agent Initialization
  • 10.6.3. LCA and CCA Initialization
  • 10.6.4. LaaS Domain Establishment
  • 10.6.5. Adding Devices to an LaaSD
  • 10.6.6. Establishing Trust between Server Agents
  • 10.6.7. MD Establishment and Management
  • 10.6.8. Secure Log Storage
  • 10.7. Threat Analysis
  • 10.8. Discussion and Future Directions
  • 10.8.1. Establishing Trust
  • 10.8.2. Log Retention
  • 10.8.3. Achievement of Objectives
  • 10.9. Summary
  • 10.10. Exercises
  • References
  • 11. Insiders
  • 11.1. Introduction
  • 11.2. Insiders Definition
  • 11.2.1. Background
  • 11.2.2. Definition
  • 11.2.3. Rules of Identifying Insiders.
  • 11.3. Conceptual Models
  • 11.3.1.Organizational View
  • 11.3.2. Assets and Clients
  • 11.3.3. Infrastructure Model
  • 11.3.4. Procedure for Identifying Potential and Malicious Insiders
  • 11.4. Summary
  • 11.5. Exercises
  • References
  • 12. Real-Life Examples
  • 12.1. OpenStack
  • 12.1.1. What is OpenStack?
  • 12.1.2. Openstack Structure
  • 12.1.3. Security in OpenStack
  • 12.1.4. OpenStack Configuration Files
  • 12.2. Amazon Web Services
  • 12.3.Component Architecture
  • 12.3.1. Nova-api
  • 12.3.2. Nova-database
  • 12.3.3. Nova-scheduler
  • 12.4. Prototype
  • 12.4.1. Trust Attestation via the DC-C
  • 12.4.2. Trust Management by the DC-S
  • 12.5. Summary
  • References
  • 13. Case Study
  • 13.1. Scenario
  • 13.2. Home Healthcare Architecture in the Cloud
  • 13.3. Insiders Analysis for Home Healthcare
  • 13.3.1. Model Instance
  • 13.3.2. Identifying Potential Insiders and Insiders
  • 13.3.3. Insider Threat Analysis
  • 13.4. Cloud Threats
  • References.