Search and Find
Service
Foreword
6
Preface
10
Introduction
10
Expected Audience
12
Book Overview
12
Part 1: Cloud Base
13
Part 2: Cloud Seeding
13
Part 3: Cloud Breaks
14
Part 4: Cloud Feedback
15
Contents
16
Part I:Cloud Base
20
Chapter 1: Tools and Technologies for Building Clouds
21
1.1 Introduction
21
1.1.1 Cloud Services and Enabling Technologies
23
1.2 Virtualization Technology
24
1.2.1 Virtual Machines
25
1.2.2 Virtualization Platforms
25
1.2.3 Virtual Infrastructure Management
27
1.2.4 Cloud Infrastructure Manager
29
1.3 The MapReduce System
30
1.3.1 Hadoop MapReduce Overview
31
1.4 Web Services
31
1.4.1 RPC (Remote Procedure Call)
32
1.4.2 SOA (Service-Oriented Architecture)
33
1.4.3 REST (Representative State Transfer)
34
1.4.4 Mashup
34
1.4.5 Web Services in Practice
35
1.5 Conclusions
35
References
36
Chapter 2: A Taxonomy, Survey, and Issues of Cloud Computing Ecosystems
39
2.1 Introduction
39
2.2 Background and Related Work
41
2.3 Taxonomy of Cloud Computing
42
2.3.1 Cloud Architecture
42
2.3.1.1 Services and Modes of Cloud Computing
43
Software-as-a-Service (SaaS)
43
Platform-as-a-Service (PaaS)
43
Hardware-as-a-Service (HaaS)
43
Infrastructure-as-a-Service (IaaS)
44
2.3.2 Virtualization Management
44
2.3.3 Core Services
45
2.3.3.1 Discovery and Replication
45
2.3.3.2 Load Balancing
45
2.3.3.3 Resource Management
46
2.3.4 Data Governance
46
2.3.4.1 Interoperability
46
2.3.4.2 Data Migration
47
2.3.5 Management Services
47
2.3.5.1 Deployment and Configuration
47
2.3.5.2 Monitoring and Reporting
47
2.3.5.3 Service-Level Agreements (SLAs) Management
48
2.3.5.4 Metering and Billing
48
2.3.5.5 Provisioning
49
2.3.6 Security
49
2.3.6.1 Encryption/Decryption
49
2.3.6.2 Privacy and Federated Identity
49
2.3.6.3 Authorization and Authentication
50
2.3.7 Fault Tolerance
50
2.4 Classification and Comparison between Cloud Computing Ecosystems
51
2.5 Findings
51
2.5.1 Cloud Computing Infrastructure Technologyand Solution Provider
51
2.5.2 Cloud Computing PaaS and SaaS Provider
59
2.5.3 Open Source Based Cloud Computing Services
60
2.6 Comments on Issues and Opportunities
60
2.7 Conclusions
62
References
62
Chapter 3: Towards a Taxonomy for Cloud Computing from an e-Science Perspective
65
3.1 Introduction
65
3.2 Scientific Workflows and e-Science
67
3.2.1 Scientific Workflows
67
3.2.2 Scientific Workflow Management Systems
67
3.2.3 Important Aspects of In Silico Experiments
68
3.3 A Taxonomy for Cloud Computing
69
3.3.1 Business Model
70
3.3.2 Privacy
71
3.3.3 Pricing
72
3.3.4 Architecture
72
3.3.5 Technology Infrastructure
73
3.3.6 Access
74
3.3.7 Standards
74
3.3.8 Orientation
75
3.4 Classifying Cloud Computing Environments Using the Taxonomy
76
3.5 Taxonomies for Cloud Computing
77
3.6 Conclusions and Final Remarks
78
References
78
Chapter 4: Examining Cloud Computingfrom the Perspective of Grid and Computer-Supported Cooperative Work
81
4.1 Introduction
81
4.2 Cloud and Grid: A Comparison
82
4.2.1 A Retrospective View
83
4.2.2 Comparison from the Viewpoint of System
84
4.2.3 Comparison from the Viewpoint of Users
86
4.2.4 A Summary
88
4.3 Examining Cloud Computing from the CSCW Perspective
88
4.3.1 CSCW Findings
89
4.3.2 The Anatomy of Cloud Computing
89
4.3.2.1 Security and Privacy
91
4.3.2.2 Data and/or Vendor Lock-In
91
4.3.2.3 Service Availability/Reliability
92
4.4 Conclusions
93
References
93
Chapter 5: Overview of Cloud Standards
95
5.1 Overview – Cloud Standards – What and Why?
95
5.2 Deep Dive: Interoperability Standards
97
5.2.1 Purpose, Expectations and Challenges
97
5.2.2 Initiatives – Focus, Sponsors and Status
98
5.2.3 Market Adoption
98
5.2.4 Gaps/Areas of Improvement
99
5.3 Deep Dive: Security Standards
99
5.3.1 Purpose, Expectations and Challenges
100
5.3.2 Initiatives – Focus, Sponsors and Status
100
5.3.3 Market Adoption
101
5.3.4 Gaps/Areas of Improvement
101
5.4 Deep Dive: Portability Standards
101
5.4.1 Purpose, Expectations and Challenges
102
5.4.2 Initiatives – Focus, Sponsors and Status
102
5.4.3 Market Adoption
102
5.4.4 Gaps/Areas of Improvement
103
5.5 Deep Dive: Governance, Risk Managementand Compliance Standards
103
5.5.1 Purpose, Expectations and Challenges
103
5.5.2 Initiatives – Focus, Sponsors and Status
104
5.5.3 Market Adoption
105
5.5.4 Gaps/Areas of Improvement
105
5.6 Deep Dive: Other Key Standards
105
5.6.1 Initiatives – Focus, Sponsors and Status
105
5.7 Closing Notes
106
References
106
Part II:Cloud Seeding
108
Chapter 6: Open and Interoperable Clouds: The Cloud@Home Way
109
6.1 Introduction and Motivation
109
6.2 Cloud@Home Overview
112
6.2.1 Issues, Challenges, and Open Problems
113
6.2.2 Basic Architecture
116
6.2.2.1 Software Environment
117
6.2.2.2 Software Infrastructure
118
6.2.2.3 Software Kernel
118
6.2.2.4 Firmware/Hardware
119
6.2.3 Application Scenarios
119
6.3 Cloud@Home Core Structure
121
6.3.1 Management Subsystem
122
6.3.2 Resource Subsystem
123
6.4 Conclusions
125
References
126
Chapter 7: A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments
128
7.1 Introduction
128
7.2 MapReduce
129
7.3 P2P-MapReduce
131
7.3.1 Architecture
131
7.3.2 Implementation
133
7.3.2.1 Basic Mechanisms
134
Resource Discovery
134
Network Maintenance
134
Job Submission and Failure Recovery
135
7.3.2.2 State Diagram and Software Modules
135
7.3.3 Evaluation
138
7.4 Conclusions
140
References
140
Chapter 8: Enhanced Network Support for Scalable Computing Clouds
141
8.1 Introduction
141
8.2 The Cloud Evolution
142
8.3 Improved Network Support for Cloud Computing
143
8.3.1 Why the Internet is Not Enough?
144
8.3.2 Transparent Optical Networks for Cloud Applications: The Dedicated Bandwidth Paradigm
145
8.4 Architecture and Implementation Details
146
8.4.1 Traffic Management and Control Plane Facilities
148
8.4.2 Service Plane and Interfaces
149
8.4.2.1 Providing Network Services to Cloud-Computing Infrastructures
150
8.4.2.2 The Cloud Operating System–Network Interface
150
8.5 Proof of Concept Implementationand Performance Analysis
151
8.5.1 The Prototype Details
151
8.5.1.1 The Underlying Network Infrastructure
152
8.5.1.2 The Prototype Cloud Network Control Logic and its Services
153
8.5.2 Performance Evaluation and Results Discussion
154
8.6 Related Work
156
8.7 Conclusions
157
References
157
Chapter 9: YML-PC: A Reference Architecture Based on Workflow for Building Scientific Private Clouds
159
9.1 Introduction
159
9.2 Overview of YML
162
9.3 Design and Implementation of YML-PC
164
9.3.1 Concept Stack of Cloud Platform
164
9.3.2 Design of YML-PC
165
9.3.3 Core Design and Implementation of YML-PC
167
9.4 Primary Experiments on YML-PC
171
9.4.1 YML-PC Can Be Scaled Up Very Easily
172
9.4.2 Data Persistence in YML-PC
173
9.4.3 Schedule Mechanism in YML-PC
173
9.5 Conclusion and Future Work
174
References
175
Chapter 10: An Efficient Framework for Running Applications on Clusters, Grids, and Clouds
177
10.1 Introduction
177
10.2 Related Work
178
10.2.1 General View of Cloud Computing frameworks
178
10.2.2 Cloud Computing Middleware
179
10.3 Deploying Applications in the Cloud
179
10.3.1 Benchmarking the Cloud
179
10.3.2 The ProActive GCM Deployment
181
10.3.3 Technical Solutions for Deployment over Heterogeneous Infrastructures
183
10.3.3.1 Virtual Private Network (VPN)
183
10.3.3.2 Amazon Virtual Private Cloud (VPC)
183
10.3.3.3 Message Forwarding and Tunneling
183
10.3.4 Conclusion and Motivation for Mixing
184
10.4 Moving HPC Applications from Grids to Clouds
185
10.4.1 HPC on Heterogeneous Multi-Domain Platforms
185
10.4.2 The Hierarchical SPMD Concept and Multi-level Partitioning of Numerical Meshes
185
10.4.3 The GCM/ProActive-Based Lightweight Framework
186
10.4.4 Performance Evaluation
187
10.5 Dynamic Mixing of Clusters, Grids, and Clouds
188
10.5.1 The ProActive Resource Manager
188
10.5.2 Cloud Bursting: Managing Spike Demand
190
10.5.3 Cloud Seeding: Dealing with Heterogeneous Hardware and Private Data
190
10.6 Conclusion
191
References
192
Chapter 11: Resource Management for Hybrid Grid and Cloud Computing
193
11.1 Introduction
193
11.2 Background
194
11.2.1 ASKALON
195
11.2.2 Cloud Computing
196
11.3 Resource Management Architecture
196
11.3.1 Cloud Management
198
11.3.2 Image Catalog
199
11.3.3 Security
200
11.4 Evaluation
202
11.5 Related Work
206
11.6 Conclusions and Future Work
207
References
207
Chapter 12: Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing
209
12.1 Introduction
210
12.2 Layered Peer-to-Peer Cloud Provisioning Architecture
212
12.3 Current State-of-the-Art and Practice in Cloud Provisioning
214
12.4 Cloud Service Discovery and Load-Balancing Using DHT Overlay
215
12.4.1 Distributed Hash Tables
215
12.4.2 Designing Complex Services over DHTs
217
12.5 Cloud Peer Software Fabric: Design and Implementation
220
12.5.1 Overlay Construction
220
12.5.2 Multidimensional Query Indexing
221
12.5.3 Multidimensional Query Routing
221
12.5.4 Designing Decentralized and Co-ordinated Load-Balancing Mechanism
223
12.6 Experiments and Evaluation
225
12.6.1 Cloud Peer Details
225
12.6.2 Aneka: PaaS Layer Application Provisioning and Management Service
226
12.6.3 Test Application
226
12.6.4 Deployment of Test Services on Amazon EC2 Platform
227
12.7 Results and Discussions
227
12.8 Conclusions and Path Forward
229
References
230
Chapter 13: Mixing Grids and Clouds: High-Throughput Science Using the Nimrod Tool Family
232
13.1 Introduction
232
13.2 High-Throughput Science with the Nimrod Tools
234
13.2.1 The Nimrod Tool Family
235
13.2.2 Nimrod and the Grid
235
13.2.3 Scheduling in Nimrod
236
13.3 Extensions to Support Amazon’s Elastic Compute Cloud
238
13.3.1 The Nimrod Architecture
239
13.3.2 The EC2 Actuator
240
13.3.3 Additions to the Schedulers
242
13.4 A Case Study in High-Throughput Science and Economic Scheduling
242
13.4.1 Introduction and Background
243
13.4.2 Computational Requirements
243
13.4.3 The Experiment
244
13.4.4 Computational and Economic Results
245
13.4.5 Scientific Results
247
13.5 Conclusions
247
References
248
Part III:Cloud Breaks
251
Chapter 14: Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World
252
14.1 Using the Cloud
252
14.1.1 Overview
252
14.1.2 Background
253
14.1.3 Requirements and Obligations
253
14.1.3.1 Regional Laws
254
14.1.3.2 Industry Regulations
255
14.2 Cloud Compliance
255
14.2.1 Information Security Organization
255
14.2.2 Data Classification
256
14.2.2.1 Classifying Data and Systems
256
14.2.2.2 Specific Type of Data of Concern
256
14.2.2.3 Labeling
257
14.2.3 Access Control and Connectivity
257
14.2.3.1 Authentication and Authorization
258
14.2.3.2 Accounting and Auditing
258
14.2.3.3 Encrypting Data in Motion
259
14.2.3.4 Encrypting Data at Rest
259
14.2.4 Risk Assessments
259
14.2.4.1 Threat and Risk Assessments
260
14.2.4.2 Business Impact Assessments
261
14.2.4.3 Privacy Impact Assessments
261
14.2.5 Due Diligence and Provider Contract Requirements
261
14.2.5.1 ISO Certification
262
14.2.5.2 SAS 70 Type II
262
14.2.5.3 PCI PA DSS or Service Provider
262
14.2.5.4 Portability and Interoperability
263
14.2.5.5 Right to Audit
263
14.2.5.6 Service Level Agreements
264
14.2.6 Other Considerations
264
14.2.6.1 Disaster Recovery/Business Continuity
264
14.2.6.2 Governance Structure
264
14.2.6.3 Incident Response Plan
265
14.3 Conclusion
265
Bibliography
265
Chapter 15: Cloud Computing – Data Confidentiality and Interoperability Challenges
267
15.1 Confidentiality of Data and Principal Issues Globally: An Overview
268
15.1.1 Location of Cloud Data and Applicable Laws
268
15.1.2 Data Concerns Within a European Context
269
15.1.3 Government Data
270
15.1.4 Trust
270
15.1.5 Interoperability and Standardization in Cloud Computing
271
15.1.6 Open Grid Forum’s (OGF) Production Grid Interoperability Working Group (PGI-WG) Charter
271
15.1.7 Achievements in the OGF Open Cloud Computing Interface (OGF-OCCI)
272
15.1.7.1 What will OCCI Provide?
272
15.1.7.2 Cloud Data Management Interface (CDMI)
273
15.1.7.3 How it Works
273
15.1.8 SDOs and their Involvement with Clouds
274
15.1.9 An Example of Cloud Computing Interoperability at Microsoft
274
15.1.10 A Microsoft Cloud Interoperability Scenario
276
15.1.11 Opportunities for Public Authorities
276
15.1.12 Future Market Drivers and Challenges
277
15.1.13 Priorities Moving Forward
278
15.2 Conclusions
278
References
280
Chapter 16: Security Issues to Cloud Computing
281
16.1 Introduction
281
16.2 Cloud Computing (‘The Cloud’)
282
16.3 Understanding Risks to Cloud Computing
285
16.3.1 Privacy Issues
286
16.3.2 Data Ownership and Content Disclosure Issues
287
16.3.3 Data Confidentiality
287
16.3.4 Data Location
289
16.3.5 Control Issues
290
16.3.6 Regulatory and Legislative Compliance
290
16.3.7 Forensic Evidence Issues
291
16.3.8 Auditing Issues
291
16.3.9 Business Continuity and Disaster Recovery Issues
292
16.3.10 Trust Issues
292
16.3.11 Security Policy Issues
293
16.3.12 Emerging Threats to Cloud Computing
293
16.4 Cloud Security Relationship Framework
294
16.4.1 Security Requirements in the Clouds
296
16.5 Conclusion
296
References
298
Chapter 17: Securing the Cloud
299
17.1 Introduction
300
17.1.1 What Is Security?
301
17.2 ISO 27002 Gap Analyses
301
17.2.1 Asset Management
302
17.2.2 Communications and Operations Management
302
17.2.3 Information Systems Acquisition, Development, and Maintenance
304
17.2.4 Information Security Incident Management
304
17.2.5 Compliance
305
17.3 Security Recommendations
305
17.4 Case Studies
309
17.4.1 Private Cloud: Fortune 100 Company
309
17.4.2 Public Cloud: Amazon.com
310
17.5 Summary and Conclusion
310
References
312
Part IV Cloud Feedback
313
Chapter 18: Technologies for Enforcement and Distribution of Policy in Cloud Architectures
314
18.1 Introduction
314
18.2 Decoupling Policy from Applications
315
18.2.1 Overlap of Concerns Between the PEP and PDP
316
18.2.2 Patterns for Binding PEPs to Services
317
18.2.3 Agents
317
18.2.4 Intermediaries
318
18.3 PEP Deployment Patterns in the Cloud
319
18.3.1 Software-as-a-Service Deployment
320
18.3.2 Platform-as-a-Service Deployment
320
18.3.3 Infrastructure-as-a-Service Deployment
320
18.3.4 Alternative Approaches to IaaS Policy Enforcement
321
18.3.5 Basic Web Application Security
321
18.3.6 VPN-Based Solutions
322
18.4 Challenges to Deploying PEPs in the Cloud
322
18.4.1 Performance Challenges in the Cloud
322
18.4.2 Strategies for Fault Tolerance
323
18.4.3 Strategies for Scalability
323
18.4.4 Clustering
323
18.4.5 Acceleration Strategies
324
18.4.5.1 Accelerating Message Processing
324
18.4.5.2 Acceleration of Cryptographic Operations
325
18.4.6 Transport Content Coding
325
18.4.7 Security Challenges in the Cloud
325
18.4.8 The PEP Air Gap
325
18.4.9 Binding PEPs and Applications
326
18.4.9.1 Intermediary Isolation
326
18.4.9.2 The Protected Application Stack
327
18.4.10 Authentication and Authorization
327
18.4.11 Clock Synchronization
330
18.4.12 Management Challenges in the Cloud
330
18.4.13 Audit, Logging, and Metrics
330
18.4.14 Repositories
331
18.4.15 Provisioning and Distribution
332
18.4.16 Policy Synchronization and Views
332
18.5 Conclusion
333
References
333
Chapter 19: The PRISM On-demand Digital Media Cloud
335
19.1 Introduction and Background
336
19.2 A Media Service Cloud for Traditional Broadcasting
337
19.2.1 Gridcast the PRISM Cloud 0.12
337
19.3 An On-demand Digital Media Cloud
341
19.4 PRISM Cloud Implementation
344
19.4.1 Cloud Resources
344
19.4.2 Cloud Service Deployment and Management
346
19.5 The PRISM Deployment
346
19.6 Summary
348
19.7 Content Note
348
References
348
Chapter 20: Cloud Economics: Principles, Costs, and Benefits
350
20.1 Cloud Computing Reference Model
350
20.2 Cloud Economics
352
20.2.1 Economic Context
352
20.2.2 Economic Benefits
353
20.2.3 Economic Costs
354
20.2.4 Company Size, Economic Costs, and Benefits of Cloud Computing
354
20.2.5 The Economics of Green Clouds
355
20.3 Quality of Experience in the Cloud
358
20.4 Monetization Models in the Cloud
362
20.5 Charging in the Cloud
364
20.5.1 Existing Models of Charging
364
20.5.1.1 On-Demand IaaS Instances
365
20.5.1.2 Reserved IaaS Instances
365
20.5.1.3 PaaS Charging
365
20.5.1.4 Cloud Vendor Pricing Model
365
20.5.1.5 Interprovider Charging
366
20.6 Taxation in the Cloud
366
References
367
Chapter 21: Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids
368
21.1 Introduction
368
21.2 Background
370
21.3 Experiment
371
21.3.1 Target Application: Value at Risk
371
21.3.2 Target Systems
372
21.3.2.1 Condor
372
21.3.2.2 Amazon EC2
372
21.3.2.3 Eucalyptus
373
21.3.3 Results
373
21.3.4 Job Completion
376
21.3.5 Cost
376
21.4 Conclusions and Future Work
377
References
378
Index
380
All prices incl. VAT