Developing and Securing the Cloud

Book description

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.

Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies.

Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds.

Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today’s cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas.

This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it’s best to build their own clouds or contract them out.

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/4)
  4. Contents (2/4)
  5. Contents (3/4)
  6. Contents (4/4)
  7. Preface (1/2)
  8. Preface (2/2)
  9. Acknowledgments
  10. Author
  11. Chapter 1: Introduction (1/5)
  12. Chapter 1: Introduction (2/5)
  13. Chapter 1: Introduction (3/5)
  14. Chapter 1: Introduction (4/5)
  15. Chapter 1: Introduction (5/5)
  16. Chapter 2: From Mainframe to the Cloud (1/2)
  17. Chapter 2: From Mainframe to the Cloud (2/2)
  18. Chapter 3: Trustworthy Systems (1/4)
  19. Chapter 3: Trustworthy Systems (2/4)
  20. Chapter 3: Trustworthy Systems (3/4)
  21. Chapter 3: Trustworthy Systems (4/4)
  22. Chapter 4: Data, Information, and Knowledge Management (1/4)
  23. Chapter 4: Data, Information, and Knowledge Management (2/4)
  24. Chapter 4: Data, Information, and Knowledge Management (3/4)
  25. Chapter 4: Data, Information, and Knowledge Management (4/4)
  26. Conclusion to Part I
  27. Chapter 5: Service-Oriented Computing and Security (1/9)
  28. Chapter 5: Service-Oriented Computing and Security (2/9)
  29. Chapter 5: Service-Oriented Computing and Security (3/9)
  30. Chapter 5: Service-Oriented Computing and Security (4/9)
  31. Chapter 5: Service-Oriented Computing and Security (5/9)
  32. Chapter 5: Service-Oriented Computing and Security (6/9)
  33. Chapter 5: Service-Oriented Computing and Security (7/9)
  34. Chapter 5: Service-Oriented Computing and Security (8/9)
  35. Chapter 5: Service-Oriented Computing and Security (9/9)
  36. Chapter 6: Semantic Web Services and Security (1/5)
  37. Chapter 6: Semantic Web Services and Security (2/5)
  38. Chapter 6: Semantic Web Services and Security (3/5)
  39. Chapter 6: Semantic Web Services and Security (4/5)
  40. Chapter 6: Semantic Web Services and Security (5/5)
  41. Chapter 7: Specialized Web Services and Security (1/8)
  42. Chapter 7: Specialized Web Services and Security (2/8)
  43. Chapter 7: Specialized Web Services and Security (3/8)
  44. Chapter 7: Specialized Web Services and Security (4/8)
  45. Chapter 7: Specialized Web Services and Security (5/8)
  46. Chapter 7: Specialized Web Services and Security (6/8)
  47. Chapter 7: Specialized Web Services and Security (7/8)
  48. Chapter 7: Specialized Web Services and Security (8/8)
  49. Conclusion to Part II
  50. Chapter 8: Cloud Computing Concepts (1/2)
  51. Chapter 8: Cloud Computing Concepts (2/2)
  52. Chapter 9: Cloud Computing Functions (1/2)
  53. Chapter 9: Cloud Computing Functions (2/2)
  54. Chapter 10: Cloud Data Management (1/4)
  55. Chapter 10: Cloud Data Management (2/4)
  56. Chapter 10: Cloud Data Management (3/4)
  57. Chapter 10: Cloud Data Management (4/4)
  58. Chapter 11: Specialized Clouds, Services, and Applications (1/2)
  59. Chapter 11: Specialized Clouds, Services, and Applications (2/2)
  60. Chapter 12: Cloud Service Providers, Products, and Frameworks (1/3)
  61. Chapter 12: Cloud Service Providers, Products, and Frameworks (2/3)
  62. Chapter 12: Cloud Service Providers, Products, and Frameworks (3/3)
  63. Conclusion to Part III
  64. Chapter 13: Experimental Cloud Query Processing System (1/6)
  65. Chapter 13: Experimental Cloud Query Processing System (2/6)
  66. Chapter 13: Experimental Cloud Query Processing System (3/6)
  67. Chapter 13: Experimental Cloud Query Processing System (4/6)
  68. Chapter 13: Experimental Cloud Query Processing System (5/6)
  69. Chapter 13: Experimental Cloud Query Processing System (6/6)
  70. Chapter 14: Social Networking on the Cloud (1/6)
  71. Chapter 14: Social Networking on the Cloud (2/6)
  72. Chapter 14: Social Networking on the Cloud (3/6)
  73. Chapter 14: Social Networking on the Cloud (4/6)
  74. Chapter 14: Social Networking on the Cloud (5/6)
  75. Chapter 14: Social Networking on the Cloud (6/6)
  76. Chapter 15: Experimental Semantic Web-Based Cloud Computing Systems (1/3)
  77. Chapter 15: Experimental Semantic Web-Based Cloud Computing Systems (2/3)
  78. Chapter 15: Experimental Semantic Web-Based Cloud Computing Systems (3/3)
  79. Conclusion to Part IV
  80. Chapter 16: Secure Cloud Computing Concepts (1/4)
  81. Chapter 16: Secure Cloud Computing Concepts (2/4)
  82. Chapter 16: Secure Cloud Computing Concepts (3/4)
  83. Chapter 16: Secure Cloud Computing Concepts (4/4)
  84. Chapter 17: Secure Cloud Computing Functions (1/2)
  85. Chapter 17: Secure Cloud Computing Functions (2/2)
  86. Chapter 18: Secure Cloud Data Management (1/3)
  87. Chapter 18: Secure Cloud Data Management (2/3)
  88. Chapter 18: Secure Cloud Data Management (3/3)
  89. Chapter 19: Secure Cloud Computing Guidelines (1/2)
  90. Chapter 19: Secure Cloud Computing Guidelines (2/2)
  91. Chapter 20: Security as a Service (1/2)
  92. Chapter 20: Security as a Service (2/2)
  93. Chapter 21: Secure Cloud Computing Products (1/2)
  94. Chapter 21: Secure Cloud Computing Products (2/2)
  95. Conclusion to Part V
  96. Chapter 22: Secure Cloud Query Processing with Relational Data (1/3)
  97. Chapter 22: Secure Cloud Query Processing with Relational Data (2/3)
  98. Chapter 22: Secure Cloud Query Processing with Relational Data (3/3)
  99. Chapter 23: Secure Cloud Query Processing with Semantic Web Data (1/4)
  100. Chapter 23: Secure Cloud Query Processing with Semantic Web Data (2/4)
  101. Chapter 23: Secure Cloud Query Processing with Semantic Web Data (3/4)
  102. Chapter 23: Secure Cloud Query Processing with Semantic Web Data (4/4)
  103. Chapter 24: Secure Cloud-Based Information Integration (1/2)
  104. Chapter 24: Secure Cloud-Based Information Integration (2/2)
  105. Conclusion to Part VI
  106. Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams (1/5)
  107. Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams (2/5)
  108. Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams (3/5)
  109. Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams (4/5)
  110. Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams (5/5)
  111. Chapter 26: Cloud-Based Data Mining for Insider Threat Detection (1/3)
  112. Chapter 26: Cloud-Based Data Mining for Insider Threat Detection (2/3)
  113. Chapter 26: Cloud-Based Data Mining for Insider Threat Detection (3/3)
  114. Chapter 27: Cloud-Centric Assured Information Sharing (1/7)
  115. Chapter 27: Cloud-Centric Assured Information Sharing (2/7)
  116. Chapter 27: Cloud-Centric Assured Information Sharing (3/7)
  117. Chapter 27: Cloud-Centric Assured Information Sharing (4/7)
  118. Chapter 27: Cloud-Centric Assured Information Sharing (5/7)
  119. Chapter 27: Cloud-Centric Assured Information Sharing (6/7)
  120. Chapter 27: Cloud-Centric Assured Information Sharing (7/7)
  121. Chapter 28: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System (1/4)
  122. Chapter 28: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System (2/4)
  123. Chapter 28: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System (3/4)
  124. Chapter 28: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System (4/4)
  125. Conclusion to Part VII
  126. Chapter 29: Trust Management and the Cloud (1/2)
  127. Chapter 29: Trust Management and the Cloud (2/2)
  128. Chapter 30: Privacy and Cloud Services (1/2)
  129. Chapter 30: Privacy and Cloud Services (2/2)
  130. Chapter 31: Integrity Management, Data Provenance, and Cloud Services (1/2)
  131. Chapter 31: Integrity Management, Data Provenance, and Cloud Services (2/2)
  132. Conclusion to Part VIII
  133. Chapter 32: An Infrastructure for a Secure Cloud (1/4)
  134. Chapter 32: An Infrastructure for a Secure Cloud (2/4)
  135. Chapter 32: An Infrastructure for a Secure Cloud (3/4)
  136. Chapter 32: An Infrastructure for a Secure Cloud (4/4)
  137. Chapter 33: An Education Program for a Secure Cloud (1/4)
  138. Chapter 33: An Education Program for a Secure Cloud (2/4)
  139. Chapter 33: An Education Program for a Secure Cloud (3/4)
  140. Chapter 33: An Education Program for a Secure Cloud (4/4)
  141. Chapter 34: A Research Initiative for a Secure Cloud (1/4)
  142. Chapter 34: A Research Initiative for a Secure Cloud (2/4)
  143. Chapter 34: A Research Initiative for a Secure Cloud (3/4)
  144. Chapter 34: A Research Initiative for a Secure Cloud (4/4)
  145. Chapter 35: Summary and Directions (1/2)
  146. Chapter 35: Summary and Directions (2/2)
  147. Conclusion to Part IX
  148. Appendix A: Data Management Systems—Developments and Trends (1/4)
  149. Appendix A: Data Management Systems—Developments and Trends (2/4)
  150. Appendix A: Data Management Systems—Developments and Trends (3/4)
  151. Appendix A: Data Management Systems—Developments and Trends (4/4)
  152. Appendix B: Data Mining Techniques (1/4)
  153. Appendix B: Data Mining Techniques (2/4)
  154. Appendix B: Data Mining Techniques (3/4)
  155. Appendix B: Data Mining Techniques (4/4)
  156. Appendix C: Access Control in Database Systems (1/4)
  157. Appendix C: Access Control in Database Systems (2/4)
  158. Appendix C: Access Control in Database Systems (3/4)
  159. Appendix C: Access Control in Database Systems (4/4)
  160. Appendix D: Assured Information Sharing Life Cycle (1/2)
  161. Appendix D: Assured Information Sharing Life Cycle (2/2)
  162. Back Cover

Product information

  • Title: Developing and Securing the Cloud
  • Author(s): Bhavani Thuraisingham
  • Release date: October 2013
  • Publisher(s): Auerbach Publications
  • ISBN: 9781439862926