Cloud Computing with Security (eBook)

Concepts and Practices
eBook Download: PDF
2019 | 2nd ed. 2020
XLIV, 355 Seiten
Springer International Publishing (Verlag)
978-3-030-24612-9 (ISBN)

Lese- und Medienproben

Cloud Computing with Security - Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
Systemvoraussetzungen
90,94 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing etc.  Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures.  The authors explain carefully the 'why's and how's' of Cloud Computing, so engineers will find this book an invaluable source of information to the topic.  This second edition includes new material on Cloud Computing Security, Threat Vectors and Trust Models, as well as best practices for a using dynamic cloud infrastructure, and cloud operations management.  Several new examples and analysis of cloud security have been added, including edge computing with IoT devices.




Naresh K. Sehgal has been working at Intel since 1988, prior to that completed his B.E. from Punjab Engineering College, M.S. and Ph.D. from Syracuse University. Naresh has taught a Cloud Computing class at Santa Clara University, where he also earned a MBA.

Pramod Chandra (PCP) Bhatt started his teaching career in 1965 at IIT Kanpur, and then moved to IIT Delhi in 1969, and retired from IIT Delhi in 1996. Prof Bhatt also worked as a visiting professor at the University of Ottawa, McGill University, Montreal (Canada), Universities of Dortmund, Paderborn and Bochum (Germany), and Kochi University of Technology (Japan).  Prof. Bhatt has a M.E. from Calcutta University and a PhD from IIT Kanpur. He has also been a Konrad Zuse Fellow at the University of Dortmund.

John M. Acken is a research faculty member in the Electrical and Computer Engineering Department, Portland State University, Portland, OR.  John received his BS and MS in Electrical Engineering from Oklahoma State University and Ph. D. in Electrical Engineering from Stanford University. His projects include technology and devices for information security and identity authentication. John has worked as an Electrical Engineer and Manager at several companies, including the US Army, Sandia National Labs in Albuquerque, New Mexico and Intel in Santa Clara, CA.  John's time in the US Army was in the Army Security Agency, a branch of NSA during the Vietnam War.

Foreword to the Second Edition 6
Foreword to the First Edition 7
Foreword to the First Edition 8
Preface to the Second Edition 11
Preface to the First Edition 13
Acknowledgments 15
Contents 16
Abbreviations 22
Definitions 25
Chapter 1: Introduction 39
1.1 Motivation 39
1.2 Cloud Computing Definitions 40
1.3 Cloud Computing Operational Characteristics 41
1.3.1 Cloud Computing Benefits 43
1.3.2 Cloud Computing Potential Risks 44
1.4 Cloud Computing Trends 44
1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure 45
1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception 45
1.4.3 Trend #3: Service-Level Agreements (SLAs) 45
1.5 Cloud Computing Needs 45
1.6 Information Security Needs 46
1.7 Edge Computing and IoT Trends 47
1.8 This Book’s Organization 47
1.9 Points to Ponder 48
References 49
Chapter 2: Foundations of Cloud Computing and Information Security 50
2.1 Historical Evolution 50
2.2 Different Network Protocols 52
2.3 Role of Internet Protocols in a Data Center 55
2.4 Data Center Architecture and Connectivity 57
2.5 Evolution of Enterprise IT 58
2.6 Evolution of Web Services 59
2.7 Server Operations in a Data Center 63
2.8 Server-Based Web Services 67
2.9 Evolution of Service-Oriented Architecture 68
2.10 Transition from SOA to Cloud Computing 70
2.11 Building an Enterprise SOA Solution 71
2.12 Top-Down vs. Bottom-Up Approach 73
2.13 Enterprise Service Bus (ESB) 75
2.14 Enterprise Implementation on Private Cloud 76
2.15 Enterprise Implementation on Hybrid Cloud 78
2.16 Information Security Basic Concepts 78
2.17 An Example of a Security Attack 80
2.18 Cloud Software Security Requirements 81
2.19 Rising Security Threats 83
2.20 Summary 84
2.21 Points to Ponder 84
References 85
Chapter 3: Cloud Computing Pyramid 86
3.1 Roots of Cloud Computing 86
3.2 Essential Characteristics of Cloud Computing 89
3.3 Role of Virtualization 90
3.4 Cloud Players and Their Concerns 91
3.5 Considerations for Cloud Data Centers 93
3.5.1 Migration 93
3.5.2 Performance 94
3.5.3 Security 94
3.6 Points to Ponder 95
References 96
Chapter 4: Features of Private and Public Cloud 97
4.1 Customer Expectations of Cloud Computing 97
4.2 Interoperability of Cloud Computing 99
4.3 System Failures, Diagnostics, and Recovery 99
4.4 Reliability of Cloud Computing 101
4.5 Performance of Cloud Computing 102
4.6 A Sample Study 103
4.7 Security 107
4.8 Summary 108
4.9 Points to Ponder 108
References 109
Chapter 5: Cloud Workload Characterization 110
5.1 Motivation 110
5.2 Some Background on Workload Characterization 111
5.3 Top-Level Cloud Workload Categorization 114
5.4 Cloud Workload Categories 115
5.5 Computing Resources 119
5.5.1 Data Busses Between Servers 120
5.6 Example Workload Categorizations 121
5.7 Temporal Variability of Workloads 121
5.8 Low-Level or Hardware Metrics of Computer Utilization 125
5.9 Dynamic Monitoring and Cloud Resource Allocation 126
5.10 Benefits to Cloud Service Providers 127
5.11 Summary 129
5.12 Points to Ponder 130
References 130
Chapter 6: Cloud Management and Monitoring 133
6.1 Motivation 133
6.2 Introduction to Cloud Setup and Basic Tools 133
6.3 Noisy Neighbors in a Cloud 134
6.4 Cloud Management Requirements 135
6.5 Essentials of Monitoring 136
6.6 Some Example of Monitoring Tools 137
6.7 Monitoring Use of Images and Their Security 139
6.8 Follow-ME Cloud 141
6.9 Future Outlook 142
6.10 Points to Ponder 143
References 143
Chapter 7: Cloud Computing and Information Security 145
7.1 Information Security Background, Information Context, and Definitions 145
7.2 Evolution of Security Considerations 147
7.3 Security Concerns of Cloud Operating Models 149
7.4 Identity Authentication 150
7.5 Secure Transmissions 154
7.6 Secure Storage and Computation 155
7.7 The Security Players 155
7.8 Traditional vs. Internet Security Issues 157
7.9 Security Using Encryption Keys 159
7.10 Challenges of Using Standard Security Algorithms 162
7.11 Variations and Special Cases for Security Issues with Cloud Computing 163
7.11.1 The Players 164
7.11.2 Secure Communication 165
7.11.3 An Example of Security Scenario for Cloud Computing 165
7.12 A Few Key Challenges Related to Cloud Computing and Virtualization 167
7.13 Some Suggested Security Practices for Cloud Computing 168
7.14 Side Channel Security Attacks in the Cloud 170
7.15 An Introduction to Block Chain for Security 172
7.16 Summary 173
7.17 Points to Ponder 173
References 174
Chapter 8: Migrating to Cloud 176
8.1 Cloud Business Models 176
8.2 A Case Study: B2C 177
8.3 A Case Study: B2B 178
8.4 A Case Study: C2C 179
8.5 Plugging IoT Devices in a Cloud 181
8.6 Using Multi-party Cloud 184
8.7 Software-Based Hardware Security Modules 185
8.8 Summary 186
8.9 Points to Ponder 186
References 187
Chapter 9: Migrating a Complex Industry to Cloud 188
9.1 Background 188
9.2 Introduction to EDA 189
9.3 A Brief History of EDA Tools and Flows 190
9.3.1 The Nascent Years of the 1970s 190
9.3.2 The Roaring 1980s 191
9.3.3 Growing Up in the 1990s 191
9.3.4 Maturing into the First Decade of the Twenty-First Century 192
9.3.5 From the 2010s Till Now: EDA Stable 192
9.4 EDA Flow Steps Mapping to Cloud 193
9.5 Considerations for Cloud Computing Adoption 198
9.6 Applying Block Chain to Security 201
9.7 Summary 202
9.8 Points to Ponder 203
References 203
Chapter 10: Cost and Billing Practices in Cloud 206
10.1 Cloud as a Service (CaaS): The Billing Imperatives 206
10.1.1 Cloud Business Practices 206
10.2 Load Balancing 207
10.3 Pay as You Go 208
10.4 Amazon EC2 Motivations and Setup 209
10.4.1 Amazon On-Demand Instances 210
10.4.2 Amazon Spot Instances 210
10.4.3 Amazon Reserved Instances 211
10.4.4 Amazon Dedicated Instances and Dedicated Hosts 211
10.5 Motivation and Methods for Right Sizing Customer VMs 212
10.5.1 Elastic IP 212
10.5.2 Elastic Load Balancing 213
10.5.3 Auto Scaling 214
10.6 Cost Minimization 215
10.7 Capacity Forecasting 218
10.8 Optimizations Across Cloud 219
10.9 Types of Cloud Service-Level Agreements 221
10.10 Summary 223
10.11 Points to Ponder 223
References 224
Chapter 11: Additional Security Considerations for Cloud 225
11.1 Introduction 225
11.2 Web Threat Models 227
11.3 Open Web Application Security Project 228
11.4 Emergence of Edge Computing 230
11.4.1 Status of Edge Computing Security and Recent Breaches 231
11.4.2 Security Modeling Specifically Targeting Edge Computing 232
11.5 Security Solutions for IoT Devices 236
11.6 Metrics for Access Control Using Speaker Identification 237
11.7 Real-Time Control of Cyber-Physical Systems 243
11.8 Summary 246
11.9 Points to Ponder 246
References 246
Chapter 12: Analytics in the Cloud 248
12.1 Background and Problem Statement 248
12.2 Introduction to MapReduce 250
12.3 Introduction to Hadoop 252
12.4 Usage of Amazon’s MapReduce 253
12.5 Twitter Sentimental Analysis Using Cloud 256
12.6 IoT-Driven Analytics in Cloud 257
12.7 Real-Time Decision-Making Support Systems 259
12.8 Machine Learning in a Public Cloud 261
12.9 Future Possibilities 263
12.10 Points to Ponder 263
References 263
Chapter 13: Future Trends in Cloud Computing 265
13.1 Revisiting History of Computing 265
13.2 Current Limitations of Cloud Computing 265
13.3 Emergence of Internet of Things (IoT) 267
13.4 Emergence of Machine Learning 268
13.5 Emergence of Edge Computing 270
13.6 Security Issues in Edge Computing 271
13.7 Security Solutions for Edge Computing 272
13.8 Example of an IoT-Based Cloud Service 274
13.9 Hardware as the Root of Trust 276
13.10 Security in Multi-party Cloud 277
13.11 Privacy-Preserving Multi-party Analytics in a Cloud 278
13.12 Hardware-Based Security Implementation 280
13.13 Outsourced Computing Using Homomorphic Encryption 283
13.14 Patching for Security 284
13.15 Machine Learning for Security 286
13.16 Future Work Needed 287
13.17 Summary 287
13.18 Points to Ponder 288
References 288
Chapter 14: A Quick Test of Your Cloud Fundamentals Grasp 290
14.1 Multiple Choice Questions 290
14.2 Detailed Questions 294
14.3 Answer Key for Multiple Choice Questions 295
14.4 Answer Key for Detailed Questions 296
14.5 Additional Challenging Questions 298
Chapter 15: Hands-On Project to Use Cloud Service Provider 299
15.1 Project 1: Install Lamp Stack on Amazon EC2 299
15.1.1 Installing Lamp Web Server on AWS via EC2 299
15.1.2 Installing WordPress 309
15.1.3 WordPress URL 319
15.2 Project 2: Install PHP on Your AWS Instance 320
15.3 Project 3: Enhance Security of Your Aws Instance 321
15.4 Project 4: Set Up a Load Balancer for Your AWS Instance 323
15.4.1 Elastic Load Balancer Setup 323
15.4.2 Unique Features of AWS Load Balancer 328
15.5 Project 5: Use Elastic IP for Your AWS Instance 329
15.5.1 How to Make an Instance Elastic 329
15.5.2 Extra: Elastic IP 329
15.5.3 Bonus 330
15.6 Points to Ponder 340
15.7 Project 6: Encryption Strength of Key Size 340
15.7.1 How to Evaluate Encryption Strength Based upon Factoring Keys 340
Appendix A 342
Appendix A: Points to Ponder 342
Chapter #1: Points to Ponder 342
Chapter #2: Points to Ponder 344
Chapter #3: Points to Ponder 346
Chapter #4: Points to Ponder 347
Chapter #5: Points to Ponder 349
Chapter #6: Points to Ponder 350
Chapter #7: Points to Ponder 351
Chapter #8: Points to Ponder 353
Chapter #9: Points to Ponder 355
Chapter #10: Points to Ponder 357
Chapter #11: Points to Ponder 358
Chapter #12: Points to Ponder 360
Chapter #13: Points to Ponder 361
Appendix B: Additional Considerations for Cloud Computing 364
References 370
Appendix C: Suggested List of Additional Cloud Projects 371
Appendix D: Trust Models for IoT Devices 373
References 378
Index 379

Erscheint lt. Verlag 4.9.2019
Zusatzinfo XLIV, 355 p. 206 illus., 190 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Architecting the Cloud • Cloud Computing and Information Security • Design Decisions for Cloud Computing Service Models • edge computing • internet of things
ISBN-10 3-030-24612-4 / 3030246124
ISBN-13 978-3-030-24612-9 / 9783030246129
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 16,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
69,99
Konzepte, Methoden, Lösungen und Arbeitshilfen für die Praxis

von Ernst Tiemeyer

eBook Download (2023)
Carl Hanser Verlag GmbH & Co. KG
69,99
Der Weg zur professionellen Vektorgrafik

von Uwe Schöler

eBook Download (2024)
Carl Hanser Verlag GmbH & Co. KG
29,99