Cloud management and security /

"This book discusses the foundations of Cloud computing, and covers in detail two main aspects of Cloud computing"--

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Abbadi, Imad M. (Συγγραφέας)
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Chichester, West Sussex ; Hoboken, NJ : John Wiley & Sons Inc., 2014.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • 1.Introduction
  • 1.1.Overview
  • 1.2.Cloud Definition
  • 1.3.Cloud Evolution
  • 1.4.Cloud Services
  • 1.5.Cloud Deployment Types
  • 1.6.Main Challenges of Clouds
  • 1.7.Summary
  • 1.8.Exercises
  • References
  • 2.Cloud Structure
  • 2.1.Introduction
  • 2.2.Infrastructure Components
  • 2.2.1.Storage Components
  • 2.2.2.Physical Servers
  • 2.2.3.Network Components
  • 2.3.Cloud Layers
  • 2.3.1.Vertical Slices
  • 2.3.2.Horizontal Slices
  • 2.3.3.Horizontal vs. Vertical Slices
  • 2.3.4.Illustrative Example
  • 2.4.Cloud Relations
  • 2.4.1.Intra-layer Relations
  • 2.4.2.Across-layer Relations
  • 2.5.Cloud Dynamics
  • 2.6.Data Types
  • 2.7.Summary
  • 2.8.Exercises
  • References
  • 3.Fundamentals of Cloud Management
  • 3.1.Introduction
  • 3.2.Clouds Management Services
  • 3.2.1.Application Deployment Scenario
  • 3.2.2.Identifying Cloud Management Services
  • 3.3.Virtual Control Center
  • 3.4.Prerequisite Input Data for Management Services
  • 3.5.Management of User Requirements
  • 3.5.1.Requirement Management Workflow
  • 3.5.2.Challenges and Requirements
  • 3.5.3.Categories and Delegation of User Requirements
  • 3.5.4.Illustrative Example
  • 3.6.Summary
  • 3.7.Exercises
  • References
  • 4.Cloud Properties
  • 4.1.Introduction
  • 4.2.Adaptability Property
  • 4.3.Resilience Property
  • 4.4.Scalability Property
  • 4.5.Availability Property
  • 4.6.Reliability Property
  • 4.7.Security and Privacy Property
  • 4.8.Business Model
  • 4.9.Summary
  • 4.10.Exercises
  • References
  • 5.Automated Management Services
  • 5.1.Introduction
  • 5.2.Virtual Layer Self-managed Services
  • 5.2.1.Adaptability as a Virtual Service
  • 5.2.2.System Architect as a Virtual Service
  • 5.2.3.Resilience as a Virtual Service
  • 5.2.4.Scalability as a Virtual Service
  • 5.2.5.Availability as a Virtual Service
  • 5.2.6.Reliability as a Virtual Service
  • 5.3.Virtual Services Interdependency
  • 5.4.Application Layer Self-managed Services
  • 5.4.1.Adaptability as an Application Service
  • 5.4.2.Resilience as an Application Service
  • 5.4.3.Scalability as an Application Service
  • 5.4.4.Availability as an Application Service
  • 5.4.5.Reliability as an Application Service
  • 5.5.Application Services Interdependency
  • 5.6.Security and Privacy by Design
  • 5.7.Multi-tier Application Deployment in the Cloud
  • 5.7.1.Application Architecture
  • 5.7.2.Managed Services Interaction
  • 5.8.Main Challenges and Requirements
  • 5.8.1.Challenges
  • 5.8.2.Requirements
  • 5.9.Summary
  • 5.10.Exercises
  • References
  • 6.Background
  • 6.1.Topics Flow
  • 6.2.Trusted Computing
  • 6.2.1.Introduction
  • 6.2.2.Trusted Platform Module
  • 6.2.3.TCG Main Components
  • 6.2.4.The TP Main Functions
  • 6.2.5.Challenges in TCG Specifications
  • 6.3.Summary
  • References
  • 7.Challenges for Establishing Trust in Clouds
  • 7.1.Introduction
  • 7.2.Effects of Cloud Dynamism on Trust Relationships
  • 7.2.1.Load Balancing
  • 7.2.2.Horizontal Scaling
  • 7.2.3.Vertical Scaling
  • 7.2.4.Redundancy
  • 7.2.5.Clustering
  • 7.3.Challenges
  • 7.4.Summary
  • 7.5.Exercises
  • References
  • 8.Establishing Trust in Clouds
  • 8.1.Introduction
  • 8.2.Organization Requirements
  • 8.3.Framework Requirements
  • 8.4.Device Properties
  • 8.5.Framework Architecture
  • 8.5.1.Dynamic Domain Concept
  • 8.5.2.Proposed Architecture
  • 8.6.Required Software Agents
  • 8.6.1.Server Agent Functions
  • 8.6.2.Client Agent Functions
  • 8.6.3.Server Agent Initialization
  • 8.6.4.Client Agent Initialization
  • 8.7.Framework Workflow
  • 8.7.1.Management Domain and Collaborating Management Domain Establishment
  • 8.7.2.Organization Home Domain Establishment
  • 8.7.3.Adding Devices to a Domain
  • 8.7.4.Outsourced Domain and Collaborating Outsourced Domain Establishment
  • 8.8.Discussion and Analysis
  • 8.8.1.Benefits of Using Trusted Computing
  • 8.8.2.Benefits of the Framework Architecture
  • 8.8.3.Content Protection
  • 8.9.Summary
  • 8.10.Exercises
  • References
  • 9.Clouds Chains of Trust
  • 9.1.Introduction
  • 9.2.Software Agents Revision
  • 9.3.Roots of and Chains of Trust Definition
  • 9.3.1.Roots of Trust
  • 9.3.2.Chains of Trust
  • 9.4.Intra-layer Chains of Trust
  • 9.4.1.A Resource Chain of Trust
  • 9.4.2.Compositional Chains of Trust
  • 9.4.3.Physical Layer DCoT and CDCoT
  • 9.4.4.Virtual Layer DCoT and CDCoT
  • 9.4.5.Application Layer DCoT and CDCoT
  • 9.5.Trust Across Layers
  • 9.6.Summary
  • 9.7.Exercises
  • References
  • 10.Provenance in Clouds
  • 10.1.Introduction
  • 10.1.1.Log and Provenance
  • 10.1.2.Problem Description and Objectives
  • 10.1.3.Organization of the Chapter
  • 10.2.Motivating Scenarios
  • 10.3.Log Records Management and Requirements
  • 10.3.1.Database Design
  • 10.3.2.Security Requirements
  • 10.3.3.Other Requirements and Device Properties
  • 10.4.Framework Domain Architecture
  • 10.5.Framework Software Agents
  • 10.5.1.Cloud Server Agent
  • 10.5.2.LaaS Server Agent
  • 10.5.3.LaaS Client Agent
  • 10.5.4.VM Agent
  • 10.5.5.Cloud Client Agent
  • 10.6.Framework Workflow
  • 10.6.1.Cloud Server Agent Initialization
  • 10.6.2.LaaS Server Agent Initialization
  • 10.6.3.LCA and CCA Initialization
  • 10.6.4.LaaS Domain Establishment
  • 10.6.5.Adding Devices to an LaaSD
  • 10.6.6.Establishing Trust between Server Agents
  • 10.6.7.MD Establishment and Management
  • 10.6.8.Secure Log Storage
  • 10.7.Threat Analysis
  • 10.8.Discussion and Future Directions
  • 10.8.1.Establishing Trust
  • 10.8.2.Log Retention
  • 10.8.3.Achievement of Objectives
  • 10.9.Summary
  • 10.10.Exercises
  • References
  • 11.Insiders
  • 11.1.Introduction
  • 11.2.Insiders Definition
  • 11.2.1.Background
  • 11.2.2.Definition
  • 11.2.3.Rules of Identifying Insiders
  • 11.3.Conceptual Models
  • 11.3.1.Organizational View
  • 11.3.2.Assets and Clients
  • 11.3.3.Infrastructure Model
  • 11.3.4.Procedure for Identifying Potential and Malicious Insiders
  • 11.4.Summary
  • 11.5.Exercises
  • References
  • 12.Real-Life Examples
  • 12.1.OpenStack
  • 12.1.1.What is OpenStack?
  • 12.1.2.Openstack Structure
  • 12.1.3.Security in OpenStack
  • 12.1.4.OpenStack Configuration Files
  • 12.2.Amazon Web Services
  • 12.3.Component Architecture
  • 12.3.1.Nova-api
  • 12.3.2.Nova-database
  • 12.3.3.Nova-scheduler
  • 12.4.Prototype
  • 12.4.1.Trust Attestation via the DC-C
  • 12.4.2.Trust Management by the DC-S
  • 12.5.Summary
  • References
  • 13.Case Study
  • 13.1.Scenario
  • 13.2.Home Healthcare Architecture in the Cloud
  • 13.3.Insiders Analysis for Home Healthcare
  • 13.3.1.Model Instance
  • 13.3.2.Identifying Potential Insiders and Insiders
  • 13.3.3.Insider Threat Analysis
  • 13.4.Cloud Threats
  • References.