Details

Cloud Computing Solutions


Cloud Computing Solutions

Architecture, Data Storage, Implementation, and Security
1. Aufl.

von: Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik

173,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 05.05.2022
ISBN/EAN: 9781119682158
Sprache: englisch
Anzahl Seiten: 400

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>CLOUD COMPUTING SOLUTIONS</b> <p><b>The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems.</b> <p>This book discusses the evolution of cloud computing through grid computing and cluster computing. It will help researchers and practitioners to understand grid and distributed computing cloud infrastructure, virtual machines, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art cloud computing countermeasures. <p>This book covers the spectrum of cloud computing-related technologies and the wide-ranging contents will differentiate this book from others. The topics treated in the book include: <ul><li>The evolution of cloud computing from grid computing, cluster computing, and distributed systems;</li> <li>Covers cloud computing and virtualization environments;</li> <li>Discusses live migration, database, auditing, and applications as part of the materials related to cloud computing;</li> <li>Provides concepts of cloud storage, cloud strategy planning, and management, cloud security, and privacy issues;</li> <li>Explains complex concepts clearly and covers information for advanced users and beginners.</li></ul> <p><b>Audience</b><br> <p>The primary audience for the book includes IT, computer science specialists, researchers, graduate students, designers, experts, and engineers who are occupied with research.
<p>List of Figures xvii</p> <p>List of Tables xix</p> <p>Foreword xxi</p> <p>Preface xxiii</p> <p>Acknowledgments xxv</p> <p>Acronyms xxvii</p> <p><b>Part I: Cloud Computing Architecture 1</b></p> <p><b>1 Basics of Cloud Computing 3<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>1.1 Evolution of Cloud Computing 4</p> <p>1.2 Cluster Computing 7</p> <p>1.2.1 The Architecture of Cluster Computing Environment 7</p> <p>1.2.2 Components of Computer Cluster 8</p> <p>1.3 Grid Computing 9</p> <p>1.3.1 Grid-Related Technologies 10</p> <p>1.3.2 Levels of Deployment 11</p> <p>1.3.3 Architecture of Grid Computing Environment 13</p> <p>1.4 Mobile Computing 16</p> <p>1.4.1 Characteristics of Mobile Computing 17</p> <p>1.4.2 Characteristics of Mobile Networks 17</p> <p>1.5 Summary 18</p> <p>Exercises 18</p> <p>References 19</p> <p><b>2 Introduction to Cloud Computing 21<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>2.1 Definition of Cloud Computing 22</p> <p>2.2 Characteristics of Cloud 22</p> <p>2.2.1 Elasticity and Scalability 23</p> <p>2.2.2 Metered and Billing of Service 23</p> <p>2.2.3 Self-Service Allocation of Resources 23</p> <p>2.2.4 Application Programming Interface (APIs) 24</p> <p>2.2.5 Efficiency Measurement Service 24</p> <p>2.2.6 Device and Location Interdependency 24</p> <p>2.2.7 Customization 24</p> <p>2.2.8 Security 25</p> <p>2.3 Cloud Computing Environment 25</p> <p>2.3.1 Access to Supporting Business Agility 25</p> <p>2.3.2 Minimizing Investment Expenditures 25</p> <p>2.3.3 Public Cloud Computing Environment 25</p> <p>2.3.4 Private Cloud Computing Environment 26</p> <p>2.3.5 Hybrid Cloud Computing Environment 27</p> <p>2.3.6 Community Cloud Computing Environment 27</p> <p>2.4 Cloud Services 28</p> <p>2.4.1 Resources as a Service (RaaS) 28</p> <p>2.4.2 Infrastructure as a Service (IaaS) 28</p> <p>2.4.3 Platform as a Service (PaaS) 29</p> <p>2.4.4 Software as a Service (SaaS) 30</p> <p>2.4.5 Network as a Service (NaaS) 31</p> <p>2.4.6 Desktop as a Service (DaaS/VDI) 32</p> <p>2.4.7 Recovery as a Service (DRaaS) 32</p> <p>2.5 Security Paradigms and Issues of Cloud Computing 32</p> <p>2.6 Major Cloud Service Providers 33</p> <p>2.6.1 IaaS CSPs 33</p> <p>2.6.2 PaaS CSPs 35</p> <p>2.6.3 SaaS CSPs 35</p> <p>2.7 Summary 35</p> <p>Exercises 36</p> <p>References 37</p> <p><b>3 Architectural Framework for Cloud Computing 39<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>3.1 Challenges of Cloud Computing Environment 40</p> <p>3.2 Architectural Framework for Cloud Computing 41</p> <p>3.2.1 Service-Oriented Architecture (SOA) 41</p> <p>3.2.2 SOA Characterization 42</p> <p>3.2.3 Life Cycle of Services in SOA 43</p> <p>3.2.4 Integrating SOA and the Cloud 45</p> <p>3.2.5 Cloud Architecture 46</p> <p>3.3 Architectural Workflow and Co-ordination of Multiple Activities 49</p> <p>3.3.1 Characteristics of Workflow 50</p> <p>3.3.2 Need for Workflow 50</p> <p>3.4 Examples of Workflow Tools 52</p> <p>3.5 Summary 53</p> <p>Exercises 53</p> <p>References 54</p> <p><b>4 Virtualization Environment in Cloud Computing 57<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>4.1 Introduction 58</p> <p>4.1.1 Need of Virtualization in Cloud Computing Environment 58</p> <p>4.1.2 Virtualization versus Traditional Approach 58</p> <p>4.2 Virtualization and Virtual Machine 59</p> <p>4.2.1 Advantages of Virtualization Technique in Cloud Computing Environment 60</p> <p>4.2.2 Category of Virtual Machine 61</p> <p>4.3 Virtualization Model for Cloud Computing 64</p> <p>4.3.1 Distributed Resources of Physical Hosts 65</p> <p>4.3.2 Hypervisor Monitoring Environment (HME) 65</p> <p>4.3.3 Platform Service 66</p> <p>4.3.4 Software Service 66</p> <p>4.3.5 Broker Service 67</p> <p>4.3.6 Business Service 67</p> <p>4.4 Categorization of Guest OS Virtualization Techniques 68</p> <p>4.4.1 Full Virtualization 68</p> <p>4.4.2 Paravirtualization 69</p> <p>4.4.3 Hardware-Assisted Virtualization 70</p> <p>4.5 Mapping Technique of Virtual Machine to Physical Machine in a Private Cloud 71</p> <p>4.6 Drawbacks of Virtualization 72</p> <p>4.7 Summary 73</p> <p>Exercises 74</p> <p>References 75</p> <p><b>5 Classification of Virtualization Environment 77<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>5.1 Introduction 78</p> <p>5.2 Classification 78</p> <p>5.2.1 Scheduling-Based Environment 79</p> <p>5.2.2 Load Distribution-Based Environment 80</p> <p>5.2.3 Energy-Aware-Based Environment 81</p> <p>5.2.4 Operational-Based Environment 82</p> <p>5.2.5 Distribution Pattern-Based Environment 85</p> <p>5.2.6 Transaction-Based Environment 86</p> <p>5.3 Summary 87</p> <p>Exercises 87</p> <p>References 88</p> <p><b>Part II: Cloud Computing Data Storage 91</b></p> <p><b>6 An Approach to Live Migration of Virtual Machines in Cloud Computing Environment 93<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>6.1 Introduction 94</p> <p>6.2 Need of Live Migration of Virtual Machine 94</p> <p>6.3 Advantages of Live Migration 94</p> <p>6.4 A Design Approach to Live Migration 95</p> <p>6.4.1 Live Migration Process 97</p> <p>6.5 Security Issues 99</p> <p>6.5.1 Possible Attacks 99</p> <p>6.5.2 Solutions 100</p> <p>6.6 Summary 100</p> <p>Exercises 100</p> <p>References 101</p> <p><b>7 Reliability Issues in Cloud Computing Environment 103<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>7.1 Introduction 104</p> <p>7.1.1 Research Problem Statement 105</p> <p>7.1.2 Research Aim 105</p> <p>7.1.3 Research Question 105</p> <p>7.2 Literature Review 106</p> <p>7.2.1 Cloud Service Models 107</p> <p>7.2.2 Elements of Reliable Cloud Computing 108</p> <p>7.2.3 Cloud Computing Gaps and Concerns 109</p> <p>7.2.4 Trends in Cloud Computing 110</p> <p>7.3 Reliability Issues in Cloud Computing Research 111</p> <p>7.3.1 Research Methodology 111</p> <p>7.3.2 Research Strategy 111</p> <p>7.3.3 Data Collection 112</p> <p>7.3.4 Sampling 112</p> <p>7.3.5 Data Analysis and Findings 112</p> <p>7.4 Findings 114</p> <p>7.4.1 Lack of Effort to Address Reliability and Availability Issues 114</p> <p>7.4.2 Performance Issues 115</p> <p>7.4.3 Privacy Issues 115</p> <p>7.5 Summary 115</p> <p>Exercises 116</p> <p>References 116</p> <p><b>8 Cloud Database 123<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>8.1 Introduction 124</p> <p>8.2 Non-Relational Data Models 124</p> <p>8.2.1 Transactions in Cloud Databases 125</p> <p>8.2.2 Advantages of Cloud Database 125</p> <p>8.3 Heterogeneous Databases in DaaS 126</p> <p>8.3.1 Relational and Non-Relational Database 126</p> <p>8.3.2 Centralized and Distributed Database 126</p> <p>8.3.3 Structured and Unstructured Database 127</p> <p>8.3.4 Infrastructure-Based and Infrastructureless Databases 127</p> <p>8.3.5 SQL-Based and NoSQL-Based Databases 128</p> <p>8.4 Study of a Document-Oriented Cloud Database - MongoDB 129</p> <p>8.4.1 Data Model 129</p> <p>8.4.2 Replication 129</p> <p>8.4.3 Sharding 130</p> <p>8.4.4 Architecture 131</p> <p>8.4.5 Consistency 132</p> <p>8.4.6 Failure Handling 132</p> <p>8.5 CAP Theorem for Cloud Database Transaction 132</p> <p>8.6 Issues in Live Migration of Databases in Cloud 133</p> <p>8.7 Cloud Database Classification Based on Transaction Processing 134</p> <p>8.7.1 ACID-Based Cloud Database 134</p> <p>8.7.2 NoACID-Based Cloud Database 135</p> <p>8.8 Commercially Available Cloud Database Platform 136</p> <p>8.8.1 Amazon Web Services 137</p> <p>8.8.2 Microsoft Windows Azure 138</p> <p>8.8.3 Google App Engine 138</p> <p>8.9 Summary 138</p> <p>Exercises 138</p> <p>References 140</p> <p><b>9 Cloud-Based Data Storage 143<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>9.1 Relevant Hadoop Tools 144</p> <p>9.2 Hadoop Distributed File System (HDFS) 145</p> <p>9.2.1 HDFS Architecture 145</p> <p>9.2.2 Data Read Process in HDFS 146</p> <p>9.2.3 Data Write Process in HDFS 147</p> <p>9.2.4 Authority Management of HDFS 148</p> <p>9.2.5 Limitations of HDFS 148</p> <p>9.3 Data Mining Challenges with Big Data 149</p> <p>9.4 MapReduce 151</p> <p>9.4.1 MapReduce Architecture 151</p> <p>9.4.2 MapReduce Procedure 152</p> <p>9.4.3 Limitations of MapReduce 153</p> <p>9.5 Next Generation of MapReduce: YARN 154</p> <p>9.5.1 YARN Compared to MapReduce 1.0 (MRv1) 155</p> <p>9.5.2 YARN and MapReduce 2.0 (MRv2) 156</p> <p>9.5.3 YARN Architecture 156</p> <p>9.5.4 Advantages of YARN 159</p> <p>9.6 Classification of Data Mining Systems 160</p> <p>9.6.1 Classification According to Kind of Databases Mined 160</p> <p>9.6.2 Classification According to Kind of Knowledge Mined 160</p> <p>9.6.3 Classification According to Kind of Techniques Utilized 161</p> <p>9.6.4 Classification According to the Applications Adapted 161</p> <p>9.7 Summary 162</p> <p>Exercises 162</p> <p>References 163</p> <p><b>10 Auditing Concept in Cloud Computing 165<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>10.1 Introduction 166</p> <p>10.2 Data Security in Cloud Computing Environment 166</p> <p>10.2.1 Characteristics of a Secure Cloud Computing Environment 166</p> <p>10.2.2 Need for Auditing in Cloud Computing Environment 167</p> <p>10.2.3 Auditing Background Within Third-Party Service Provider 167</p> <p>10.3 Cloud Auditing Outsourcing Life Cycle Phases 167</p> <p>10.4 Auditing Classification 168</p> <p>10.5 Auditing Service 169</p> <p>10.5.1 How Third-Party Service Provider is Enabling Auditing Service 171</p> <p>10.5.2 Auditing Process Analysis 171</p> <p>10.5.3 Privacy and Integrity 174</p> <p>10.5.4 Cloud-Auditing Architecture Analysis 176</p> <p>10.6 Summary 177</p> <p>Exercises 178</p> <p>References 178</p> <p><b>Part III: Cloud Computing Implementation, Security and Applications 181</b></p> <p><b>11 Security Paradigms in Cloud Computing 183<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>11.1 Security Paradigms and Issues 184</p> <p>11.2 Cloud Security Challenges 185</p> <p>11.3 Cloud Economics 187</p> <p>11.4 Security of Big Data in Cloud 187</p> <p>11.4.1 The Biggest Risk: Data Breach 188</p> <p>11.4.2 Data Loss 188</p> <p>11.4.3 Account or Service Traffic Hijacking 189</p> <p>11.4.4 Insecure Interfaces and APIs 189</p> <p>11.4.5 Denial of Service 190</p> <p>11.4.6 Malicious Insiders 190</p> <p>11.4.7 Abuse of Cloud Users 190</p> <p>11.4.8 Inadequate Due Diligence 191</p> <p>11.4.9 Vulnerabilities in Shared Technology 191</p> <p>11.5 Security as a Service in Cloud 191</p> <p>11.6 Summary 194</p> <p>Exercises 194</p> <p>References 195</p> <p><b>12 Privacy Preservation Issues in Cloud Computing 197<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>12.1 Privacy Issues in Cloud Storage 198</p> <p>12.1.1 Encryption Methods 198</p> <p>12.1.2 Access Control Mechanisms 199</p> <p>12.1.3 Query Integrity/Keyword Searches 200</p> <p>12.1.4 Auditability Schemes 200</p> <p>12.2 Privacy and Security 201</p> <p>12.2.1 Performance Unpredictability, Latency and Reliability 202</p> <p>12.2.2 Portability and Interoperability 203</p> <p>12.2.3 Data Breach Through Fiber-Optic Networks 204</p> <p>12.2.4 Data Storage over IP Networks 204</p> <p>12.2.5 Data Storage and Security in Cloud 205</p> <p>12.3 Threats to Security in Cloud Computing 208</p> <p>12.3.1 Basic Security 208</p> <p>12.3.2 Network-Level Security 209</p> <p>12.3.3 Application-Level Security 211</p> <p>12.4 Security Issues in Cloud Deployment Models 215</p> <p>12.4.1 Security Issues in a Public Cloud 215</p> <p>12.4.2 Security Issues in a Private Cloud 216</p> <p>12.5 Ensuring Security Against Various Types of Attacks 217</p> <p>12.6 Survey of Privacy Preservation Using Fuzzy Set and Genetic Algorithm 219</p> <p>12.6.1 Fuzzy-Based Approach for Privacy-Preserving Publication of Data 219</p> <p>12.6.2 Privacy-Preserving Fuzzy Association Rules Hiding in Quantitative Data 220</p> <p>12.6.3 A Rough Computing-Based Performance Evaluation Approach for Educational Institutions 222</p> <p>12.6.4 A New Method for Preserving Privacy in Quantitative Association Rules Using Genetic Algorithm 223</p> <p>12.6.5 Privacy Preserving in Association Rules Using a Genetic Algorithm 224</p> <p>12.7 Summary 225</p> <p>Exercises 225</p> <p>References 226</p> <p><b>13 Applications of Wireless Sensor Network in Cloud 233<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>13.1 Introduction 234</p> <p>13.2 Architectural Issues of Combining Cloud Computing and Wireless Sensor Networks 234</p> <p>13.3 Sensor Network Overview 235</p> <p>13.3.1 Terminology 235</p> <p>13.3.2 Routing Protocols in WSNs 236</p> <p>13.4 Application Scenarios 237</p> <p>13.4.1 Military Use 237</p> <p>13.4.2 Weather Forecasting 237</p> <p>13.4.3 Healthcare 238</p> <p>13.4.4 Transport Monitoring 238</p> <p>13.5 Summary 238</p> <p>Exercises 239</p> <p>References 239</p> <p><b>14 Applications of Mobile Cloud Computing 243<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>14.1 What is Mobile Cloud Computing? 244</p> <p>14.2 The Architecture of Mobile Cloud Computing 245</p> <p>14.3 Characteristics of Mobile Cloud Computing 245</p> <p>14.4 Advantages of Mobile Cloud Computing 246</p> <p>14.5 Mobile Cloud Applications 248</p> <p>14.5.1 Mobile Commerce 248</p> <p>14.5.2 Mobile Learning 249</p> <p>14.5.3 Mobile Healthcare 249</p> <p>14.5.4 Mobile Gaming 250</p> <p>14.5.5 Mobile Social Network 251</p> <p>14.5.6 Multimedia Sharing 252</p> <p>14.6 Summary 252</p> <p>Exercises 252</p> <p>References 253</p> <p><b>15 Big Data in Cloud Computing 257<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>15.1 Introduction to Big Data 258</p> <p>15.2 Big Data vs. Cloud Computing 259</p> <p>15.3 Big Data and the Cloud 261</p> <p>15.4 Cloud Computing to Support Big Data 262</p> <p>15.4.1 Cloud Storage for Big Data Storage 262</p> <p>15.4.2 Cloud Computing for Big Data Processing 262</p> <p>15.4.3 Cloud Computing for Big Data Analytics 263</p> <p>15.4.4 Cloud Computing for Big Data Sharing and Remote Collaboration 263</p> <p>15.5 Opportunities and Challenges 263</p> <p>15.5.1 Pros of Putting Big Data in the Cloud 263</p> <p>15.5.2 Potential Challenges of Big Data in the Cloud 264</p> <p>15.6 Summary 265</p> <p>Exercises 265</p> <p>References 266</p> <p><b>Part IV: Cloud Computing Simulator Tools 269</b></p> <p><b>16 CloudSim: A Simulator for Cloud Computing Environment 271<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>16.1 Introduction 272</p> <p>16.2 Main Features 272</p> <p>16.3 CloudSim Architecture 273</p> <p>16.3.1 Modeling the Cloud 274</p> <p>16.3.2 Modeling the VM Allocation 275</p> <p>16.3.3 Modeling the Cloud Market 276</p> <p>16.3.4 Modeling the Network Behavior 276</p> <p>16.3.5 Modeling a Federation of Clouds 276</p> <p>16.3.6 Modeling Dynamic Workloads 277</p> <p>16.3.7 Modeling Data Center Power Consumption 278</p> <p>16.3.8 Modeling Dynamic Entities Creation 278</p> <p>16.4 Design and Implementation of CloudSim 279</p> <p>16.5 Setting up Development Environments 282</p> <p>16.6 How to Use CloudSim with Eclipse 282</p> <p>References 285</p> <p><b>17 OpenFaaS 287<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>17.1 Introduction 288</p> <p>17.2 OpenFaaS Architecture 288</p> <p>17.3 OpenFaaS Installation 289</p> <p>17.3.1 Development Environment with Docker Swarm 290</p> <p>17.3.2 Multi-Node Cluster with Docker Swarm 291</p> <p>17.3.3 Production Environment with Kubernetes 293</p> <p>17.3.4 Installing OpenFaaS Using Helm 297</p> <p>17.3.5 Install OpenShift 298</p> <p>17.4 Considerations 300</p> <p>17.5 Operation of OpenFaaS 300</p> <p>17.5.1 Setup and Configuration of the Open FaaS Command Line Tool 300</p> <p>17.5.2 OpenFaaS Store 301</p> <p>17.5.3 Management and Usage of Functions 301</p> <p>17.5.4 Development of Functions 302</p> <p>17.5.5 Working with Docker Registries 302</p> <p>17.5.6 Web UI 303</p> <p>References 303</p> <p><b>18 OpenNebula 305<br /></b><i>Prasant Kumar Pattnaik, Dac-Nhuong Le, Souvik Pal</i></p> <p>18.1 Project Goal and Environment 306</p> <p>18.2 Set Up Masternode with Frontend 306</p> <p>18.2.1 Install Components 306</p> <p>18.2.2 Starting the Frontend 306</p> <p>18.3 Set Up Worker Node with KVM 307</p> <p>18.3.1 Install Components 307</p> <p>18.3.2 Establish an SSH Communication Pipeline between Master and Worker 308</p> <p>18.3.3 Network Configuration 308</p> <p>18.4 Register Worker Node 308</p> <p>18.5 Deploy VM 309</p> <p>References 311</p> <p><b>19 OpenStack 313<br /></b><i>Dac-Nhuong Le, Souvik Pal, Prasant Kumar Pattnaik</i></p> <p>19.1 OpenStack 314</p> <p>19.2 Terminologies in OpenStack 314</p> <p>19.3 OpenStack Architecture 315</p> <p>19.3.1 Compute (Nova) 316</p> <p>19.3.2 Networking (Neuron) 316</p> <p>19.3.3 Image 316</p> <p>19.3.4 Object Storage (Swift) 316</p> <p>19.3.5 Block Storage (Cinder) 316</p> <p>19.4 Logical Architecture 317</p> <p>19.5 OpenStack Installation Guide 318</p> <p>19.5.1 Hardware Requirements 318</p> <p>19.5.2 Networking Requirements 319</p> <p>19.6 OpenStack Work 321</p> <p>References 322</p> <p><b>20 Eucalyptus 325<br /></b><i>Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik</i></p> <p>20.1 Introduction to Eucalyptus 326</p> <p>20.1.1 Eucalyptus Overview 326</p> <p>20.1.2 Eucalyptus Architecture 326</p> <p>20.1.3 Eucalyptus Components 327</p> <p>20.2 Eucalyptus Installation 328</p> <p>20.2.1 System Requirements 329</p> <p>20.2.2 Services Placement 330</p> <p>20.2.3 Eucalyptus Features 331</p> <p>20.2.4 Networking Modes 332</p> <p>20.2.5 Install Repositories 332</p> <p>20.3 Configure Eucalyptus 335</p> <p>20.4 Amazon Web Services Compatibility 337</p> <p>References 337</p> <p>Glossary 339</p> <p>Authors 365</p>
<p><b>Souvik Pal </b>is an associate professor in the Department of Computer Science and Engineering at Sister Nivedita University (Techno India Group), Kolkata, India. He has edited about 15 books and published numerous articles in research journals. His research area includes cloud computing, big data, internet of things, wireless sensor network, and data analytics.</p> <p><b>Dac-Nhuong Le obtained his PhD</b> in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of the Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and image processing in biomedicine. He has more than 50 publications and edited/authored 15 computer science books. <p><b>Prasant Kumar Pattnaik, PhD</b> is a professor at the School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, India. He has published many research papers in peer-reviewed international journals and conferences and has authored many computer science books in the fields of data mining, robotics, graph theory, Turing machine, cryptography, security solutions in cloud computing, mobile computing, and privacy preservation.
<p><b>The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems.</b></p> <p>This book discusses the evolution of cloud computing through grid computing and cluster computing. It will help researchers and practitioners to understand grid and distributed computing cloud infrastructure, virtual machines, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art cloud computing countermeasures. <p>This book covers the spectrum of cloud computing-related technologies and the wide-ranging contents will differentiate this book from others. The topics treated in the book include: <ul><li>The evolution of cloud computing from grid computing, cluster computing, and distributed systems;</li> <li>Covers cloud computing and virtualization environments;</li> <li>Discusses live migration, database, auditing, and applications as part of the materials related to cloud computing;</li> <li>Provides concepts of cloud storage, cloud strategy planning, and management, cloud security, and privacy issues;</li> <li>Explains complex concepts clearly and covers information for advanced users and beginners.</li></ul> <p><b>Audience</b><br> <p>The primary audience for the book includes IT, computer science specialists, researchers, graduate students, designers, experts, and engineers who are occupied with research.

Diese Produkte könnten Sie auch interessieren:

Intelligent Systems for Rehabilitation Engineering
Intelligent Systems for Rehabilitation Engineering
von: Roshani Raut, Pranav Pathak, Sandeep Kautish, Pradeep N.
EPUB ebook
190,99 €
Cyber Security and Digital Forensics
Cyber Security and Digital Forensics
von: Mangesh M. Ghonge, Sabyasachi Pramanik, Ramchandra Mangrulkar, Dac-Nhuong Le
PDF ebook
190,99 €
Smart Systems for Industrial Applications
Smart Systems for Industrial Applications
von: C. Venkatesh, N. Rengarajan, P. Ponmurugan, S. Balamurugan
EPUB ebook
190,99 €