This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the “why’s and how’s” of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture andhttps protocol.
Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud;
Describes for IT managers how to improve their Cloud Computing infrastructures;
Includes coverage of security concerns with Cloud operating models;
Uses several case studies to illustrate the “why’s and how’s” of using the Cloud;
Examples and options to improve Cloud Computing Scalability.
Author(s): Naresh Kumar Sehgal, Pramod Chandra P. Bhatt, John M. Acken
Edition: 3
Publisher: Springer
Year: 2022
Language: English
Pages: 416
City: Cham
Foreword to the Third Edition
Foreword to the Second Edition
Foreword to the First Edition
Foreword to the First Edition
Preface to the Third Edition
Preface to the Second Edition
Preface to the First Edition
Acknowledgments
Contents
Abbreviations
Chapter 1: Introduction
1.1 Motivation
1.2 Cloud Computing Definitions
1.3 Cloud Computing Operational Characteristics
1.3.1 Cloud Computing Benefits
1.3.2 Cloud Computing Potential Risks
1.4 Cloud Computing Trends
1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure
1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception
1.4.3 Trend #3: Service-Level Agreements (SLAs)
1.5 Cloud Computing Needs
1.6 Information Security Needs
1.7 Edge Computing and IoT Trends
1.8 This Book’s Organization
1.9 Points to Ponder
References
Chapter 2: Foundations of Cloud Computing and Information Security
2.1 Historical Evolution
2.2 Different Network Protocols
2.3 Role of Internet Protocols in a Data Center
2.4 Data Center Architecture and Connectivity
2.5 Evolution of Enterprise IT
2.6 Evolution of Web Services
2.7 Server Operations in a Data Center
2.8 Server-Based Web Services
2.9 Evolution of Service-Oriented Architecture
2.10 Transition from SOA to Cloud Computing
2.11 Building an Enterprise SOA Solution
2.12 Top-Down vs. Bottom-Up Approach
2.13 Enterprise Service Bus (ESB)
2.14 Enterprise Implementation on Private Cloud
2.15 Enterprise Implementation on Hybrid Cloud
2.16 Information Security Basic Concepts
2.17 An Example of a Security Attack
2.18 Cloud Software Security Requirements
2.19 Rising Security Threats
2.20 Summary
2.21 Points to Ponder
References
Chapter 3: Cloud Computing Pyramid
3.1 Roots of Cloud Computing
3.2 Essential Characteristics of Cloud Computing
3.3 Role of Virtualization
3.4 Cloud Players and Their Concerns
3.5 Considerations for Cloud Data Centers
3.5.1 Migration
3.5.2 Performance
3.5.3 Security
3.6 Points to Ponder
References
Chapter 4: Features of Private and Public Cloud
4.1 Customer Expectations of Cloud Computing
4.2 Interoperability of Cloud Computing
4.3 System Failures, Diagnostics, and Recovery
4.4 Reliability of Cloud Computing
4.5 Performance of Cloud Computing
4.6 A Sample Study
4.7 Security
4.8 Summary
4.9 Points to Ponder
References
Chapter 5: Cloud Workload Characterization
5.1 Motivation
5.2 Some Background on Workload Characterization
5.3 Top-Level Cloud Workload Categorization
5.4 Cloud Workload Categories
5.5 Computing Resources
5.5.1 Data Busses Between Servers
5.6 Example Workload Categorizations
5.7 Temporal Variability of Workloads
5.8 Low-Level or Hardware Metrics of Computer Utilization
5.9 Dynamic Monitoring and Cloud Resource Allocation
5.10 Benefits to Cloud Service Providers
5.11 Summary
5.12 Points to Ponder
References
Chapter 6: Cloud Management and Monitoring
6.1 Motivation
6.2 Introduction to Cloud Setup and Basic Tools
6.3 Noisy Neighbors in a Cloud
6.4 Cloud Management Requirements
6.5 Essentials of Monitoring
6.6 Some Examples of Monitoring Tools
6.7 Monitoring Use of Images and Their Security
6.8 Follow-ME Cloud
6.9 Future Outlook
6.10 Points to Ponder
References
Chapter 7: Cloud Computing and Information Security
7.1 Information Security Background, Information Context, and Definitions
7.2 Evolution of Security Considerations
7.3 Security Concerns of Cloud Operating Models
7.4 Identity Authentication
7.5 Secure Transmissions
7.6 Secure Storage and Computation
7.7 The Security Players
7.8 Traditional vs. Internet Security Issues
7.9 Security Using Encryption Keys
7.10 Challenges of Using Standard Security Algorithms
7.11 Variations and Special Cases for Security Issues with Cloud Computing
7.11.1 The Players
7.11.2 Secure Communication
7.11.3 An Example of Security Scenario for Cloud Computing
7.12 A Few Key Challenges Related to Cloud Computing and Virtualization
7.13 Some Suggested Security Practices for Cloud Computing
7.14 Side Channel Security Attacks in the Cloud
7.15 An Introduction to Block Chain for Security
7.16 Summary
7.17 Points to Ponder
References
Chapter 8: Migrating to Cloud
8.1 Cloud Business Models
8.2 A Case Study: B2C
8.3 A Case Study: B2B
8.4 A Case Study: C2C
8.5 Plugging IoT Devices in a Cloud
8.6 Using Multi-party Cloud
8.7 Software-Based Hardware Security Modules
8.8 Summary
8.9 Points to Ponder
References
Chapter 9: Migrating a Complex Industry to Cloud
9.1 Background
9.2 Introduction to EDA
9.3 A Brief History of EDA Tools and Flows
9.3.1 The Nascent Years of the 1970s
9.3.2 The Roaring 1980s
9.3.3 Growing Up in the 1990s
9.3.4 Maturing into the First Decade of the Twenty-First Century
9.3.5 From the 2010s Till Now: EDA Stable
9.4 EDA Flow Steps Mapping to Cloud
9.5 Considerations for Cloud Computing Adoption
9.6 Applying Block Chain to Security
9.7 Summary
9.8 Points to Ponder
References
Chapter 10: Cost and Billing Practices in Cloud
10.1 Cloud as a Service (CaaS): The Billing Imperatives
10.1.1 Cloud Business Practices
10.2 Load Balancing
10.3 Pay As You Go
10.4 Amazon EC2 Motivations and Setup
10.4.1 Amazon On-Demand Instances
10.4.2 Amazon Spot Instances
10.4.3 Amazon Reserved Instances
10.4.4 Amazon Dedicated Instances and Dedicated Hosts
10.5 Motivation and Methods for Right Sizing Customer VMs
10.5.1 Elastic IP
10.5.2 Elastic Load Balancing
10.5.3 Auto Scaling
10.6 Cost Minimization
10.7 Capacity Forecasting
10.8 Optimizations Across Cloud
10.9 Types of Cloud Service-Level Agreements
10.10 Summary
10.11 Points to Ponder
References
Chapter 11: Additional Security Considerations for Cloud
11.1 Introduction
11.2 Web Threat Models
11.3 Open Web Application Security Project
11.4 Emergence of Edge Computing
11.4.1 Status of Edge Computing Security and Recent Breaches
11.4.2 Security Modeling Specifically Targeting Edge Computing
11.5 Security Solutions for IoT Devices
11.6 Metrics for Access Control Using Speaker Identification
11.7 Real-Time Control of Cyber-Physical Systems
11.8 Summary
11.9 Points to Ponder
References
Chapter 12: Analytics in the Cloud
12.1 Background and Problem Statement
12.2 Introduction to MapReduce
12.3 Introduction to Hadoop
12.4 Usage of Amazon’s MapReduce
12.5 Twitter Sentimental Analysis Using Cloud
12.6 IoT-Driven Analytics in Cloud
12.7 Real-Time Decision-Making Support Systems
12.8 Machine Learning in a Public Cloud
12.9 Future Possibilities
12.10 Points to Ponder
References
Chapter 13: Cloud Computing Scalability
13.1 A Historical Perspective
13.2 Scalability Implications of Remote Work
13.3 Framework for Scalability
13.4 Designing for Scalability
13.5 Cloud Computing Latency
13.5.1 Evolution of HTTP
13.6 Data Center Computations Scalability
13.7 Data Center Networking Scalability
13.8 Cloud Optimized Transport Protocols
13.9 Scalable Machine Learning Models in Cloud
13.10 Mixed-Mode Federated Learning Architecture
13.11 Cloud Cost Considerations
13.12 Summary
13.13 Points to Ponder
References
Chapter 14: Healthcare in the Cloud: Case Studies
14.1 Introduction
14.2 Existing TCD Solutions
14.3 Brain Health Data in Cloud
14.4 Accessing the Cloud
14.5 Trail of Bubbles
14.6 Heart Care Data in Cloud
14.7 Cloud-Based Collaborative Tools
14.8 UCSD Antibiogram: Using Unclassifiable Data
14.9 Multi-Cloud Solutions
14.10 Next Steps
14.11 Summary
14.12 Points to Ponder
References
Chapter 15: Future Trends in Cloud Computing
15.1 Introduction
15.2 Current Limitations of Cloud Computing
15.3 Emergence of Internet of Things (IoT)
15.4 Emergence of Machine Learning
15.5 Emergence of Edge Computing
15.6 Security Issues in Edge Computing
15.7 Security Solutions for Edge Computing
15.8 Example of an IoT-Based Cloud Service: Fog Computing
15.9 Hardware as the Root of Trust
15.10 Security in Multi-party Cloud
15.11 Privacy-Preserving Multi-party Analytics in a Cloud
15.12 Hardware-Based Security Implementation
15.13 Outsourced Computing Using Homomorphic Encryption
15.14 Patching for Security
15.15 Machine Learning for Security
15.16 Future Trends
15.17 Future Work Needed
15.18 Summary
15.19 Points to Ponder
References
Chapter 16: A Quick Test of Your Cloud Fundamentals Grasp
16.1 Multiple-Choice Questions
16.2 Detailed Questions
16.3 Answer Key for Multiple-Choice Questions
16.4 Answer Key for Detailed Questions
16.5 Additional Challenging Questions
Chapter 17: Hands-On Project to Use Cloud Service Provider
17.1 Project 1: Install Lamp Stack on Amazon EC2
17.1.1 Installing Lamp Web Server on AWS via EC2
17.1.2 Installing WordPress
17.1.3 WordPress URL
17.2 Project 2: Install PHP on Your AWS Instance
17.3 Project 3: Enhance Security of Your AWS Instance
17.4 Project 4: Set Up a Load Balancer for Your AWS Instance
17.4.1 Elastic Load Balancer Setup
17.4.2 Unique Features of AWS Load Balancer
17.5 Project 5: Use Elastic IP for Your AWS Instance
17.5.1 How to Make an Instance Elastic
17.5.2 Extra: Elastic IP
17.5.3 Bonus
17.6 Points to Ponder
17.7 Project 6: Encryption Strength of Key Size
17.7.1 How to Evaluate Encryption Strength Based Upon Factoring Keys
Appendices
Appendix A: Points to Ponder
Chapter #1: Points to Ponder
Chapter #2: Points to Ponder
Chapter #3: Points to Ponder
Chapter #4: Points to Ponder
Chapter #5: Points to Ponder
Chapter #6: Points to Ponder
Chapter #7: Points to Ponder
Chapter #8: Points to Ponder
Chapter #9: Points to Ponder
Chapter #10: Points to Ponder
Chapter #11: Points to Ponder
Chapter #12: Points to Ponder
Chapter# 13: Points to Ponder
Chapter# 14: Points to Ponder
Chapter #15: Points to Ponder
Appendix B: Additional Considerations for Cloud Computing
References
Appendix C: Suggested List of Additional Cloud Projects
Appendix D: Trust Models for IoT Devices
An Example of Trust-Based Scoring
References
Index