Cloud Computing

Book description

Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives.

The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing. They then survey some of the critical components that are necessary to make the cloud computing paradigm feasible. They also present various standards based on the use and implementation issues surrounding cloud computing and describe the infrastructure management that is maintained by cloud computing service providers. After addressing significant legal and philosophical issues, the book concludes with a hard look at successful cloud computing vendors.

Helping to overcome the lack of understanding currently preventing even faster adoption of cloud computing, this book arms readers with guidance essential to make smart, strategic decisions on cloud initiatives.

Table of contents

  1. Foreword
  2. Preface
  3. Introduction
    1. What Is the Cloud?
    2. The Emergence of Cloud Computing
    3. The Global Nature of the Cloud
    4. Cloud-Based Service Offerings
    5. Grid Computing or Cloud Computing?
    6. Is the Cloud Model Reliable?
    7. Benefits of Using a Cloud Model
    8. What About Legal Issues When Using Cloud Models?
    9. What Are the Key Characteristics of Cloud Computing?
    10. Challenges for the Cloud
  4. Chapter 1 The Evolution of Cloud Computing
    1. 1.1 Chapter Overview
    2. 1.2 Hardware Evolution
      1. 1.2.1 First-Generation Computers
      2. 1.2.2 Second-Generation Computers
      3. 1.2.3 Third-Generation Computers
      4. 1.2.4 Fourth-Generation Computers
    3. 1.3 Internet Software Evolution
      1. 1.3.1 Establishing a Common Protocol for the Internet
      2. 1.3.2 Evolution of Ipv6
      3. 1.3.3 Finding a Common Method to Communicate Using the Internet Protocol
      4. 1.3.4 Building a Common Interface to the Internet
      5. 1.3.5 The Appearance of Cloud Formations—From One Computer to a Grid of Many The Appearance of Cloud Formations—From One Computer to a Grid of Many
    4. 1.4 Server Virtualization
      1. 1.4.1 Parallel Processing
      2. 1.4.2 Vector Processing
      3. 1.4.3 Symmetric Multiprocessing Systems
      4. 1.4.4 Massively Parallel Processing Systems
    5. 1.5 Chapter Summary
  5. Chapter 2 Web Services Delivered from the Cloud
    1. 2.1 Chapter Overview
    2. 2.2 Communication-as-a-Service (CaaS)
      1. 2.2.1 Advantages of CaaS
      2. 2.2.2 Fully Integrated, Enterprise-Class Unifi Communications
    3. 2.3 Infrastructure-as-a-Service (IaaS)
      1. 2.3.1 Modern On-Demand Computing
      2. 2.3.2 Amazon’s Elastic Cloud Amazon’s Elastic Cloud
      3. 2.3.3 Amazon EC2 Service Characteristics
      4. 2.3.4 Mosso (Rackspace)
    4. 2.4 Monitoring-as-a-Service (MaaS)
      1. 2.4.1 Protection Against Internal and External Threats
      2. 2.4.2 Delivering Business Value
      3. 2.4.3 Real-Time Log Monitoring Enables Compliance
    5. 2.5 Platform-as-a-Service (PaaS)
      1. 2.5.1 The Traditional On-Premises Model
      2. 2.5.2 The New Cloud Model
      3. 2.5.3 Key Characteristics of PaaS
    6. 2.6 Software-as-a-Service (SaaS)
      1. 2.6.1 SaaS Implementation Issues
      2. 2.6.2 Key Characteristics of SaaS
      3. 2.6.3 Benefi of the SaaS Model
    7. 2.7 Chapter Summary
  6. Chapter 3 Building Cloud Networks
    1. 3.1 Chapter Overview
    2. 3.2 The Evolution from the MSP Model to Cloud Computing and Software-as-a-Service
      1. 3.2.1 From Single-Purpose Architectures to Multipurpose Architectures
      2. 3.2.2 Data Center Virtualization
    3. 3.3 The Cloud Data Center
    4. 3.4 Collaboration
      1. 3.4.1 Why Collaboration?
    5. 3.5 Service-Oriented Architectures as a Step Toward Cloud Computing
    6. 3.6 Basic Approach to a Data Center-Based SOA
      1. 3.6.1 Planning for Capacity
      2. 3.6.2 Planning for Availability
      3. 3.6.3 Planning for SOA Security
    7. 3.7 The Role of Open Source Software in Data Centers
    8. 3.8 Where Open Source Software Is Used
      1. 3.8.1 Web Presence
      2. 3.8.2 Database Tier
      3. 3.8.3 Application Tier
      4. 3.8.4 Systems and Network Management Tier
    9. 3.9 Chapter Summary
  7. Chapter 4 Virtualization Practicum
    1. 4.1 Chapter Overview
    2. 4.2 Downloading Sun xVM VirtualBox
    3. 4.3 Installing Sun xVM VirtualBox
    4. 4.4 Adding a Guest Operating System to VirtualBox
    5. 4.5 Downloading FreeDOS as a Guest OS
    6. 4.6 Downloading the 7-Zip Archive Tool
    7. 4.7 Adding a Guest OS to Sun xVM VirtualBox
    8. 4.8 Chapter Summary
  8. Chapter 5 Federation, Presence, Identity, and Privacy in the Cloud
    1. 5.1 Chapter Overview
    2. 5.2 Federation in the Cloud
      1. 5.2.1 Four Levels of Federation
      2. 5.2.2 How Encrypted Federation Differs from Trusted Federation
      3. 5.2.3 Federated Services and Applications
      4. 5.2.4 Protecting and Controlling Federated Communication
      5. 5.2.5 The Future of Federation
    3. 5.3 Presence in the Cloud
      1. 5.3.1 Presence Protocols
      2. 5.3.2 Leveraging Presence
      3. 5.3.3 Presence Enabled
      4. 5.3.4 The Future of Presence
      5. 5.3.5 The Interrelation of Identity, Presence, and Location in the Cloud
      6. 5.3.6 Federated Identity Management
      7. 5.3.7 Cloud and SaaS Identity Management
      8. 5.3.8 Federating Identity
      9. 5.3.9 Claims-Based Solutions
      10. 5.3.10 Identity-as-a-Service (IaaS)
      11. 5.3.11 Compliance-as-a-Service (CaaS)
      12. 5.3.12 The Future of Identity in the Cloud
    4. 5.4 Privacy and Its Relation to Cloud-Based Information Systems
      1. 5.4.1 Privacy Risks and the Cloud
      2. 5.4.2 Protecting Privacy Information
      3. 5.4.3 The Future of Privacy in the Cloud
    5. 5.5 Chapter Summary
  9. Chapter 6 Security in the Cloud
    1. 6.1 Chapter Overview
    2. 6.2 Cloud Security Challenges
    3. 6.3 Software-as-a-Service Security
      1. 6.3.1 Security Management (People)
      2. 6.3.2 Security Governance
      3. 6.3.3 Risk Management
      4. 6.3.4 Risk Assessment
      5. 6.3.5 Security Portfolio Management
      6. 6.3.6 Security Awareness
      7. 6.3.7 Education and Training
      8. 6.3.8 Policies, Standards, and Guidelines
      9. 6.3.9 Secure Software Development Life Cycle (SecSDLC)
      10. 6.3.10 Security Monitoring and Incident Response
      11. 6.3.11 Third-Party Risk Management
      12. 6.3.12 Requests for Information and Sales Support
      13. 6.3.13 Business Continuity Plan
      14. 6.3.14 Forensics
      15. 6.3.15 Security Architecture Design
      16. 6.3.16 Vulnerability Assessment
      17. 6.3.17 Password Assurance Testing
      18. 6.3.18 Logging for Compliance and Security Investigations
      19. 6.3.19 Security Images
      20. 6.3.20 Data Privacy
      21. 6.3.21 Data Governance
      22. 6.3.22 Data Security
      23. 6.3.23 Application Security
      24. 6.3.24 Virtual Machine Security
      25. 6.3.25 Identity Access Management (IAM)
      26. 6.3.26 Change Management
      27. 6.3.27 Physical Security
      28. 6.3.28 Business Continuity and Disaster Recovery
      29. 6.3.29 The Business Continuity Plan
    4. 6.4 Is Security-as-a-Service the New MSSP?
    5. 6.5 Chapter Summary
  10. Chapter 7 Common Standards in Cloud Computing
    1. 7.1 Chapter Overview
    2. 7.2 The Open Cloud Consortium
    3. 7.3 The Distributed Management Task Force
      1. 7.3.1 Open Virtualization Format
    4. 7.4 Standards for Application Developers
      1. 7.4.1 Browsers (Ajax)
      2. 7.4.2 Data (XML, JSON)
      3. 7.4.3 Solution Stacks (LAMP and LAPP) LAMP
    5. 7.5 Standards for Messaging
      1. 7.5.1 Simple Message Transfer Protocol (SMTP)
      2. 7.5.2 Post Offi Protocol (POP)
      3. 7.5.3 Internet Messaging Access Protocol (IMAP)
      4. 7.5.4 Syndication (Atom, Atom Publishing Protocol, and RSS)
      5. 7.5.5 Communications (HTTP, SIMPLE, and XMPP)
    6. 7.6 Standards for Security
      1. 7.6.1 Security (SAML OAuth, OpenID, SSL/TLS)
    7. 7.7 Chapter Summary
  11. Chapter 8 End-User Access to Cloud Computing
    1. 8.1 Chapter Overview
    2. 8.2 YouTube
    3. 8.3 YouTube API Overview
      1. 8.3.1 Widgets
      2. 8.3.2 YouTube Player APIs
      3. 8.3.3 The YouTube Custom Player
      4. 8.3.4 YouTube Data API
    4. 8.4 Zimbra
      1. 8.4.1 Zimbra Collaboration Suite (ZCS)
    5. 8.5 Facebook
      1. 8.5.1 Facebook Development
    6. 8.6 Zoho
      1. 8.6.1 Zoho CloudSQL
    7. 8.7 DimDim Collaboration
    8. 8.8 Chapter Summary
  12. Chapter 9 Mobile Internet Devices and the Cloud
    1. 9.1 Chapter Overview
    2. 9.2 What Is a Smartphone?
    3. 9.3 Mobile Operating Systems for Smartphones
      1. 9.3.1 iPhone
      2. 9.3.2 Google (Android)
      3. 9.3.3 Blackberry
      4. 9.3.4 Windows Mobile
      5. 9.3.5 Ubuntu Mobile Internet Device (MID)
    4. 9.4 Mobile Platform Virtualization
      1. 9.4.1 KVM
      2. 9.4.2 VMWare
    5. 9.5 Collaboration Applications for Mobile Platforms
    6. 9.6 Future Trends
    7. 9.7 Chapter Summary
    8. 9.8 Closing Comments
  13. Appendix A  Virtualization Practicum (Linux)  Virtualization Practicum (Linux)
    1. A.1 Overview
    2. A.2 Adding a Linux-Based Guest Operating System to VirtualBox
    3. A.3 Downloading OpenSolaris as a Guest Operating System
    4. A.4 Using the 7-Zip Archive Tool
    5. A.5 Adding the OpenSolaris Guest OS to Sun xVM VirtualBox
    6. A.6 Summary
  14. Appendix B  Executive Scenario for Cloud Migration  Executive Scenario for Cloud Migration
  15. Index

Product information

  • Title: Cloud Computing
  • Author(s): John W. Rittinghouse, James F. Ransome
  • Release date: March 2017
  • Publisher(s): CRC Press
  • ISBN: 9781439806814