Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Cloud Computing - Principles, Systems and Applications

of: Nikos Antonopoulos, Lee Gillam

Springer-Verlag, 2010

ISBN: 9781849962414 , 382 Pages

Format: PDF, Read online

Copy protection: DRM

Windows PC,Mac OSX,Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Read Online for: Windows PC,Mac OSX,Linux

Price: 171,19 EUR



More of the content

Cloud Computing - Principles, Systems and Applications


 

Foreword

6

Preface

10

Introduction

10

Expected Audience

12

Book Overview

12

Part 1: Cloud Base

13

Part 2: Cloud Seeding

13

Part 3: Cloud Breaks

14

Part 4: Cloud Feedback

15

Contents

16

Part I:Cloud Base

20

Chapter 1: Tools and Technologies for Building Clouds

21

1.1 Introduction

21

1.1.1 Cloud Services and Enabling Technologies

23

1.2 Virtualization Technology

24

1.2.1 Virtual Machines

25

1.2.2 Virtualization Platforms

25

1.2.3 Virtual Infrastructure Management

27

1.2.4 Cloud Infrastructure Manager

29

1.3 The MapReduce System

30

1.3.1 Hadoop MapReduce Overview

31

1.4 Web Services

31

1.4.1 RPC (Remote Procedure Call)

32

1.4.2 SOA (Service-Oriented Architecture)

33

1.4.3 REST (Representative State Transfer)

34

1.4.4 Mashup

34

1.4.5 Web Services in Practice

35

1.5 Conclusions

35

References

36

Chapter 2: A Taxonomy, Survey, and Issues of Cloud Computing Ecosystems

39

2.1 Introduction

39

2.2 Background and Related Work

41

2.3 Taxonomy of Cloud Computing

42

2.3.1 Cloud Architecture

42

2.3.1.1 Services and Modes of Cloud Computing

43

Software-as-a-Service (SaaS)

43

Platform-as-a-Service (PaaS)

43

Hardware-as-a-Service (HaaS)

43

Infrastructure-as-a-Service (IaaS)

44

2.3.2 Virtualization Management

44

2.3.3 Core Services

45

2.3.3.1 Discovery and Replication

45

2.3.3.2 Load Balancing

45

2.3.3.3 Resource Management

46

2.3.4 Data Governance

46

2.3.4.1 Interoperability

46

2.3.4.2 Data Migration

47

2.3.5 Management Services

47

2.3.5.1 Deployment and Configuration

47

2.3.5.2 Monitoring and Reporting

47

2.3.5.3 Service-Level Agreements (SLAs) Management

48

2.3.5.4 Metering and Billing

48

2.3.5.5 Provisioning

49

2.3.6 Security

49

2.3.6.1 Encryption/Decryption

49

2.3.6.2 Privacy and Federated Identity

49

2.3.6.3 Authorization and Authentication

50

2.3.7 Fault Tolerance

50

2.4 Classification and Comparison between Cloud Computing Ecosystems

51

2.5 Findings

51

2.5.1 Cloud Computing Infrastructure Technologyand Solution Provider

51

2.5.2 Cloud Computing PaaS and SaaS Provider

59

2.5.3 Open Source Based Cloud Computing Services

60

2.6 Comments on Issues and Opportunities

60

2.7 Conclusions

62

References

62

Chapter 3: Towards a Taxonomy for Cloud Computing from an e-Science Perspective

65

3.1 Introduction

65

3.2 Scientific Workflows and e-Science

67

3.2.1 Scientific Workflows

67

3.2.2 Scientific Workflow Management Systems

67

3.2.3 Important Aspects of In Silico Experiments

68

3.3 A Taxonomy for Cloud Computing

69

3.3.1 Business Model

70

3.3.2 Privacy

71

3.3.3 Pricing

72

3.3.4 Architecture

72

3.3.5 Technology Infrastructure

73

3.3.6 Access

74

3.3.7 Standards

74

3.3.8 Orientation

75

3.4 Classifying Cloud Computing Environments Using the Taxonomy

76

3.5 Taxonomies for Cloud Computing

77

3.6 Conclusions and Final Remarks

78

References

78

Chapter 4: Examining Cloud Computingfrom the Perspective of Grid and Computer-Supported Cooperative Work

81

4.1 Introduction

81

4.2 Cloud and Grid: A Comparison

82

4.2.1 A Retrospective View

83

4.2.2 Comparison from the Viewpoint of System

84

4.2.3 Comparison from the Viewpoint of Users

86

4.2.4 A Summary

88

4.3 Examining Cloud Computing from the CSCW Perspective

88

4.3.1 CSCW Findings

89

4.3.2 The Anatomy of Cloud Computing

89

4.3.2.1 Security and Privacy

91

4.3.2.2 Data and/or Vendor Lock-In

91

4.3.2.3 Service Availability/Reliability

92

4.4 Conclusions

93

References

93

Chapter 5: Overview of Cloud Standards

95

5.1 Overview – Cloud Standards – What and Why?

95

5.2 Deep Dive: Interoperability Standards

97

5.2.1 Purpose, Expectations and Challenges

97

5.2.2 Initiatives – Focus, Sponsors and Status

98

5.2.3 Market Adoption

98

5.2.4 Gaps/Areas of Improvement

99

5.3 Deep Dive: Security Standards

99

5.3.1 Purpose, Expectations and Challenges

100

5.3.2 Initiatives – Focus, Sponsors and Status

100

5.3.3 Market Adoption

101

5.3.4 Gaps/Areas of Improvement

101

5.4 Deep Dive: Portability Standards

101

5.4.1 Purpose, Expectations and Challenges

102

5.4.2 Initiatives – Focus, Sponsors and Status

102

5.4.3 Market Adoption

102

5.4.4 Gaps/Areas of Improvement

103

5.5 Deep Dive: Governance, Risk Managementand Compliance Standards

103

5.5.1 Purpose, Expectations and Challenges

103

5.5.2 Initiatives – Focus, Sponsors and Status

104

5.5.3 Market Adoption

105

5.5.4 Gaps/Areas of Improvement

105

5.6 Deep Dive: Other Key Standards

105

5.6.1 Initiatives – Focus, Sponsors and Status

105

5.7 Closing Notes

106

References

106

Part II:Cloud Seeding

108

Chapter 6: Open and Interoperable Clouds: The Cloud@Home Way

109

6.1 Introduction and Motivation

109

6.2 Cloud@Home Overview

112

6.2.1 Issues, Challenges, and Open Problems

113

6.2.2 Basic Architecture

116

6.2.2.1 Software Environment

117

6.2.2.2 Software Infrastructure

118

6.2.2.3 Software Kernel

118

6.2.2.4 Firmware/Hardware

119

6.2.3 Application Scenarios

119

6.3 Cloud@Home Core Structure

121

6.3.1 Management Subsystem

122

6.3.2 Resource Subsystem

123

6.4 Conclusions

125

References

126

Chapter 7: A Peer-to-Peer Framework for Supporting MapReduce Applications in Dynamic Cloud Environments

128

7.1 Introduction

128

7.2 MapReduce

129

7.3 P2P-MapReduce

131

7.3.1 Architecture

131

7.3.2 Implementation

133

7.3.2.1 Basic Mechanisms

134

Resource Discovery

134

Network Maintenance

134

Job Submission and Failure Recovery

135

7.3.2.2 State Diagram and Software Modules

135

7.3.3 Evaluation

138

7.4 Conclusions

140

References

140

Chapter 8: Enhanced Network Support for Scalable Computing Clouds

141

8.1 Introduction

141

8.2 The Cloud Evolution

142

8.3 Improved Network Support for Cloud Computing

143

8.3.1 Why the Internet is Not Enough?

144

8.3.2 Transparent Optical Networks for Cloud Applications: The Dedicated Bandwidth Paradigm

145

8.4 Architecture and Implementation Details

146

8.4.1 Traffic Management and Control Plane Facilities

148

8.4.2 Service Plane and Interfaces

149

8.4.2.1 Providing Network Services to Cloud-Computing Infrastructures

150

8.4.2.2 The Cloud Operating System–Network Interface

150

8.5 Proof of Concept Implementationand Performance Analysis

151

8.5.1 The Prototype Details

151

8.5.1.1 The Underlying Network Infrastructure

152

8.5.1.2 The Prototype Cloud Network Control Logic and its Services

153

8.5.2 Performance Evaluation and Results Discussion

154

8.6 Related Work

156

8.7 Conclusions

157

References

157

Chapter 9: YML-PC: A Reference Architecture Based on Workflow for Building Scientific Private Clouds

159

9.1 Introduction

159

9.2 Overview of YML

162

9.3 Design and Implementation of YML-PC

164

9.3.1 Concept Stack of Cloud Platform

164

9.3.2 Design of YML-PC

165

9.3.3 Core Design and Implementation of YML-PC

167

9.4 Primary Experiments on YML-PC

171

9.4.1 YML-PC Can Be Scaled Up Very Easily

172

9.4.2 Data Persistence in YML-PC

173

9.4.3 Schedule Mechanism in YML-PC

173

9.5 Conclusion and Future Work

174

References

175

Chapter 10: An Efficient Framework for Running Applications on Clusters, Grids, and Clouds

177

10.1 Introduction

177

10.2 Related Work

178

10.2.1 General View of Cloud Computing frameworks

178

10.2.2 Cloud Computing Middleware

179

10.3 Deploying Applications in the Cloud

179

10.3.1 Benchmarking the Cloud

179

10.3.2 The ProActive GCM Deployment

181

10.3.3 Technical Solutions for Deployment over Heterogeneous Infrastructures

183

10.3.3.1 Virtual Private Network (VPN)

183

10.3.3.2 Amazon Virtual Private Cloud (VPC)

183

10.3.3.3 Message Forwarding and Tunneling

183

10.3.4 Conclusion and Motivation for Mixing

184

10.4 Moving HPC Applications from Grids to Clouds

185

10.4.1 HPC on Heterogeneous Multi-Domain Platforms

185

10.4.2 The Hierarchical SPMD Concept and Multi-level Partitioning of Numerical Meshes

185

10.4.3 The GCM/ProActive-Based Lightweight Framework

186

10.4.4 Performance Evaluation

187

10.5 Dynamic Mixing of Clusters, Grids, and Clouds

188

10.5.1 The ProActive Resource Manager

188

10.5.2 Cloud Bursting: Managing Spike Demand

190

10.5.3 Cloud Seeding: Dealing with Heterogeneous Hardware and Private Data

190

10.6 Conclusion

191

References

192

Chapter 11: Resource Management for Hybrid Grid and Cloud Computing

193

11.1 Introduction

193

11.2 Background

194

11.2.1 ASKALON

195

11.2.2 Cloud Computing

196

11.3 Resource Management Architecture

196

11.3.1 Cloud Management

198

11.3.2 Image Catalog

199

11.3.3 Security

200

11.4 Evaluation

202

11.5 Related Work

206

11.6 Conclusions and Future Work

207

References

207

Chapter 12: Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing

209

12.1 Introduction

210

12.2 Layered Peer-to-Peer Cloud Provisioning Architecture

212

12.3 Current State-of-the-Art and Practice in Cloud Provisioning

214

12.4 Cloud Service Discovery and Load-Balancing Using DHT Overlay

215

12.4.1 Distributed Hash Tables

215

12.4.2 Designing Complex Services over DHTs

217

12.5 Cloud Peer Software Fabric: Design and Implementation

220

12.5.1 Overlay Construction

220

12.5.2 Multidimensional Query Indexing

221

12.5.3 Multidimensional Query Routing

221

12.5.4 Designing Decentralized and Co-ordinated Load-Balancing Mechanism

223

12.6 Experiments and Evaluation

225

12.6.1 Cloud Peer Details

225

12.6.2 Aneka: PaaS Layer Application Provisioning and Management Service

226

12.6.3 Test Application

226

12.6.4 Deployment of Test Services on Amazon EC2 Platform

227

12.7 Results and Discussions

227

12.8 Conclusions and Path Forward

229

References

230

Chapter 13: Mixing Grids and Clouds: High-Throughput Science Using the Nimrod Tool Family

232

13.1 Introduction

232

13.2 High-Throughput Science with the Nimrod Tools

234

13.2.1 The Nimrod Tool Family

235

13.2.2 Nimrod and the Grid

235

13.2.3 Scheduling in Nimrod

236

13.3 Extensions to Support Amazon’s Elastic Compute Cloud

238

13.3.1 The Nimrod Architecture

239

13.3.2 The EC2 Actuator

240

13.3.3 Additions to the Schedulers

242

13.4 A Case Study in High-Throughput Science and Economic Scheduling

242

13.4.1 Introduction and Background

243

13.4.2 Computational Requirements

243

13.4.3 The Experiment

244

13.4.4 Computational and Economic Results

245

13.4.5 Scientific Results

247

13.5 Conclusions

247

References

248

Part III:Cloud Breaks

251

Chapter 14: Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World

252

14.1 Using the Cloud

252

14.1.1 Overview

252

14.1.2 Background

253

14.1.3 Requirements and Obligations

253

14.1.3.1 Regional Laws

254

14.1.3.2 Industry Regulations

255

14.2 Cloud Compliance

255

14.2.1 Information Security Organization

255

14.2.2 Data Classification

256

14.2.2.1 Classifying Data and Systems

256

14.2.2.2 Specific Type of Data of Concern

256

14.2.2.3 Labeling

257

14.2.3 Access Control and Connectivity

257

14.2.3.1 Authentication and Authorization

258

14.2.3.2 Accounting and Auditing

258

14.2.3.3 Encrypting Data in Motion

259

14.2.3.4 Encrypting Data at Rest

259

14.2.4 Risk Assessments

259

14.2.4.1 Threat and Risk Assessments

260

14.2.4.2 Business Impact Assessments

261

14.2.4.3 Privacy Impact Assessments

261

14.2.5 Due Diligence and Provider Contract Requirements

261

14.2.5.1 ISO Certification

262

14.2.5.2 SAS 70 Type II

262

14.2.5.3 PCI PA DSS or Service Provider

262

14.2.5.4 Portability and Interoperability

263

14.2.5.5 Right to Audit

263

14.2.5.6 Service Level Agreements

264

14.2.6 Other Considerations

264

14.2.6.1 Disaster Recovery/Business Continuity

264

14.2.6.2 Governance Structure

264

14.2.6.3 Incident Response Plan

265

14.3 Conclusion

265

Bibliography

265

Chapter 15: Cloud Computing – Data Confidentiality and Interoperability Challenges

267

15.1 Confidentiality of Data and Principal Issues Globally: An Overview

268

15.1.1 Location of Cloud Data and Applicable Laws

268

15.1.2 Data Concerns Within a European Context

269

15.1.3 Government Data

270

15.1.4 Trust

270

15.1.5 Interoperability and Standardization in Cloud Computing

271

15.1.6 Open Grid Forum’s (OGF) Production Grid Interoperability Working Group (PGI-WG) Charter

271

15.1.7 Achievements in the OGF Open Cloud Computing Interface (OGF-OCCI)

272

15.1.7.1 What will OCCI Provide?

272

15.1.7.2 Cloud Data Management Interface (CDMI)

273

15.1.7.3 How it Works

273

15.1.8 SDOs and their Involvement with Clouds

274

15.1.9 An Example of Cloud Computing Interoperability at Microsoft

274

15.1.10 A Microsoft Cloud Interoperability Scenario

276

15.1.11 Opportunities for Public Authorities

276

15.1.12 Future Market Drivers and Challenges

277

15.1.13 Priorities Moving Forward

278

15.2 Conclusions

278

References

280

Chapter 16: Security Issues to Cloud Computing

281

16.1 Introduction

281

16.2 Cloud Computing (‘The Cloud’)

282

16.3 Understanding Risks to Cloud Computing

285

16.3.1 Privacy Issues

286

16.3.2 Data Ownership and Content Disclosure Issues

287

16.3.3 Data Confidentiality

287

16.3.4 Data Location

289

16.3.5 Control Issues

290

16.3.6 Regulatory and Legislative Compliance

290

16.3.7 Forensic Evidence Issues

291

16.3.8 Auditing Issues

291

16.3.9 Business Continuity and Disaster Recovery Issues

292

16.3.10 Trust Issues

292

16.3.11 Security Policy Issues

293

16.3.12 Emerging Threats to Cloud Computing

293

16.4 Cloud Security Relationship Framework

294

16.4.1 Security Requirements in the Clouds

296

16.5 Conclusion

296

References

298

Chapter 17: Securing the Cloud

299

17.1 Introduction

300

17.1.1 What Is Security?

301

17.2 ISO 27002 Gap Analyses

301

17.2.1 Asset Management

302

17.2.2 Communications and Operations Management

302

17.2.3 Information Systems Acquisition, Development, and Maintenance

304

17.2.4 Information Security Incident Management

304

17.2.5 Compliance

305

17.3 Security Recommendations

305

17.4 Case Studies

309

17.4.1 Private Cloud: Fortune 100 Company

309

17.4.2 Public Cloud: Amazon.com

310

17.5 Summary and Conclusion

310

References

312

Part IV Cloud Feedback

313

Chapter 18: Technologies for Enforcement and Distribution of Policy in Cloud Architectures

314

18.1 Introduction

314

18.2 Decoupling Policy from Applications

315

18.2.1 Overlap of Concerns Between the PEP and PDP

316

18.2.2 Patterns for Binding PEPs to Services

317

18.2.3 Agents

317

18.2.4 Intermediaries

318

18.3 PEP Deployment Patterns in the Cloud

319

18.3.1 Software-as-a-Service Deployment

320

18.3.2 Platform-as-a-Service Deployment

320

18.3.3 Infrastructure-as-a-Service Deployment

320

18.3.4 Alternative Approaches to IaaS Policy Enforcement

321

18.3.5 Basic Web Application Security

321

18.3.6 VPN-Based Solutions

322

18.4 Challenges to Deploying PEPs in the Cloud

322

18.4.1 Performance Challenges in the Cloud

322

18.4.2 Strategies for Fault Tolerance

323

18.4.3 Strategies for Scalability

323

18.4.4 Clustering

323

18.4.5 Acceleration Strategies

324

18.4.5.1 Accelerating Message Processing

324

18.4.5.2 Acceleration of Cryptographic Operations

325

18.4.6 Transport Content Coding

325

18.4.7 Security Challenges in the Cloud

325

18.4.8 The PEP Air Gap

325

18.4.9 Binding PEPs and Applications

326

18.4.9.1 Intermediary Isolation

326

18.4.9.2 The Protected Application Stack

327

18.4.10 Authentication and Authorization

327

18.4.11 Clock Synchronization

330

18.4.12 Management Challenges in the Cloud

330

18.4.13 Audit, Logging, and Metrics

330

18.4.14 Repositories

331

18.4.15 Provisioning and Distribution

332

18.4.16 Policy Synchronization and Views

332

18.5 Conclusion

333

References

333

Chapter 19: The PRISM On-demand Digital Media Cloud

335

19.1 Introduction and Background

336

19.2 A Media Service Cloud for Traditional Broadcasting

337

19.2.1 Gridcast the PRISM Cloud 0.12

337

19.3 An On-demand Digital Media Cloud

341

19.4 PRISM Cloud Implementation

344

19.4.1 Cloud Resources

344

19.4.2 Cloud Service Deployment and Management

346

19.5 The PRISM Deployment

346

19.6 Summary

348

19.7 Content Note

348

References

348

Chapter 20: Cloud Economics: Principles, Costs, and Benefits

350

20.1 Cloud Computing Reference Model

350

20.2 Cloud Economics

352

20.2.1 Economic Context

352

20.2.2 Economic Benefits

353

20.2.3 Economic Costs

354

20.2.4 Company Size, Economic Costs, and Benefits of Cloud Computing

354

20.2.5 The Economics of Green Clouds

355

20.3 Quality of Experience in the Cloud

358

20.4 Monetization Models in the Cloud

362

20.5 Charging in the Cloud

364

20.5.1 Existing Models of Charging

364

20.5.1.1 On-Demand IaaS Instances

365

20.5.1.2 Reserved IaaS Instances

365

20.5.1.3 PaaS Charging

365

20.5.1.4 Cloud Vendor Pricing Model

365

20.5.1.5 Interprovider Charging

366

20.6 Taxation in the Cloud

366

References

367

Chapter 21: Towards Application-Specific Service Level Agreements: Experiments in Clouds and Grids

368

21.1 Introduction

368

21.2 Background

370

21.3 Experiment

371

21.3.1 Target Application: Value at Risk

371

21.3.2 Target Systems

372

21.3.2.1 Condor

372

21.3.2.2 Amazon EC2

372

21.3.2.3 Eucalyptus

373

21.3.3 Results

373

21.3.4 Job Completion

376

21.3.5 Cost

376

21.4 Conclusions and Future Work

377

References

378

Index

380