Cloud Management and Security

Book description

Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing.

In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples.

Part one presents the main components constituting the Cloud and federated Cloud infrastructure
(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem
– focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security.

Key Features

• Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security

• Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students

• Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice

• Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages

• Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing

• Provides a research roadmap to establish next-generation trustworthy Cloud computing

• Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Table of contents

  1. About the Author
  2. Preface
    1. Guide to Using this Book
    2. Notes
    3. References
  3. Acknowledgments
  4. Acronyms
  5. 1 Introduction
    1. 1.1 Overview
    2. 1.2 Cloud Definition
    3. 1.3 Cloud Evolution
    4. 1.4 Cloud Services
    5. 1.5 Cloud Deployment Types
    6. 1.6 Main Challenges of Clouds
    7. 1.7 Summary
    8. 1.8 Exercises
    9. References
  6. Part One CLOUD MANAGEMENT
    1. 2 Cloud Structure
      1. 2.1 Introduction
      2. 2.2 Infrastructure Components
      3. 2.3 Cloud Layers
      4. 2.4 Cloud Relations
      5. 2.5 Cloud Dynamics
      6. 2.6 Data Types
      7. 2.7 Summary
      8. 2.8 Exercises
      9. Notes
      10. References
    2. 3 Fundamentals of Cloud Management
      1. 3.1 Introduction
      2. 3.2 Clouds Management Services
      3. 3.3 Virtual Control Center
      4. 3.4 Prerequisite Input Data for Management Services
      5. 3.5 Management of User Requirements
      6. 3.6 Summary
      7. 3.7 Exercises
      8. Notes
      9. References
    3. 4 Cloud Properties
      1. 4.1 Introduction
      2. 4.2 Adaptability Property
      3. 4.3 Resilience Property
      4. 4.4 Scalability Property
      5. 4.5 Availability Property
      6. 4.6 Reliability Property
      7. 4.7 Security and Privacy Property
      8. 4.8 Business Model
      9. 4.9 Summary
      10. 4.10 Exercises
      11. References
    4. 5 Automated Management Services
      1. 5.1 Introduction
      2. 5.2 Virtual Layer Self-managed Services
      3. 5.3 Virtual Services Interdependency
      4. 5.4 Application Layer Self-managed Services
      5. 5.5 Application Services Interdependency
      6. 5.6 Security and Privacy by Design
      7. 5.7 Multi-tier Application Deployment in the Cloud
      8. 5.8 Main Challenges and Requirements
      9. 5.9 Summary
      10. 5.10 Exercises
      11. Notes
      12. References
  7. Part Two CLOUD SECURITY FUNDAMENTALS
    1. 6 Background
      1. 6.1 Topics Flow
      2. 6.2 Trusted Computing
      3. 6.3 Summary
      4. Notes
      5. References
    2. 7 Challenges for Establishing Trust in Clouds
      1. 7.1 Introduction
      2. 7.2 Effects of Cloud Dynamism on Trust Relationships
      3. 7.3 Challenges
      4. 7.4 Summary
      5. 7.5 Exercises
      6. References
    3. 8 Establishing Trust in Clouds
      1. 8.1 Introduction
      2. 8.2 Organization Requirements
      3. 8.3 Framework Requirements
      4. 8.4 Device Properties
      5. 8.5 Framework Architecture
      6. 8.6 Required Software Agents
      7. 8.7 Framework Workflow
      8. 8.8 Discussion and Analysis
      9. 8.9 Summary
      10. 8.10 Exercises
      11. References
    4. 9 Clouds Chains of Trust
      1. 9.1 Introduction
      2. 9.2 Software Agents Revision
      3. 9.3 Roots of and Chains of Trust Definition
      4. 9.4 Intra-layer Chains of Trust
      5. 9.5 Trust Across Layers
      6. 9.6 Summary
      7. 9.7 Exercises
      8. Notes
      9. References
    5. 10 Provenance in Clouds
      1. 10.1 Introduction
      2. 10.2 Motivating Scenarios
      3. 10.3 Log Records Management and Requirements
      4. 10.4 Framework Domain Architecture
      5. 10.5 Framework Software Agents
      6. 10.6 Framework Workflow
      7. 10.7 Threat Analysis
      8. 10.8 Discussion and Future Directions
      9. 10.9 Summary
      10. 10.10 Exercises
      11. References
    6. 11 Insiders
      1. 11.1 Introduction
      2. 11.2 Insiders Definition
      3. 11.3 Conceptual Models
      4. 11.4 Summary
      5. 11.5 Exercises
      6. References
  8. Part Three PRACTICAL EXAMPLES
    1. 12 Real-Life Examples
      1. 12.1 OpenStack
      2. 12.2 Amazon Web Services
      3. 12.3 Component Architecture
      4. 12.4 Prototype
      5. 12.5 Summary
      6. Notes
      7. References
    2. 13 Case Study
      1. 13.1 Scenario
      2. 13.2 Home Healthcare Architecture in the Cloud
      3. 13.3 Insiders Analysis for Home Healthcare
      4. 13.4 Cloud Threats
      5. References
  9. Index
  10. End User License Agreement

Product information

  • Title: Cloud Management and Security
  • Author(s): Imad M. Abbadi
  • Release date: August 2014
  • Publisher(s): Wiley
  • ISBN: 9781118817094