|
|
1 | (12) |
|
|
1 | (1) |
|
1.2 Cloud Computing Definitions |
|
|
2 | (1) |
|
1.3 Cloud Computing Operational Characteristics |
|
|
3 | (3) |
|
1.3.1 Cloud Computing Benefits |
|
|
5 | (1) |
|
1.3.2 Cloud Computing Potential Risks |
|
|
6 | (1) |
|
1.4 Cloud Computing Trends |
|
|
6 | (1) |
|
1.4.1 Trend #1: Abstraction of Network, Storage, Database, Security, and Computing Infrastructure |
|
|
7 | (1) |
|
1.4.2 Trend #2: A Pricing Model that Is Retail in Its Conception |
|
|
7 | (1) |
|
1.4.3 Trend #3: Service-Level Agreements (SLAs) |
|
|
7 | (1) |
|
1.5 Cloud Computing Needs |
|
|
7 | (1) |
|
1.6 Information Security Needs |
|
|
8 | (1) |
|
1.7 Edge Computing and IoT Trends |
|
|
9 | (1) |
|
1.8 This Book's Organization |
|
|
9 | (1) |
|
|
10 | (3) |
|
|
11 | (2) |
|
2 Foundations of Cloud Computing and Information Security |
|
|
13 | (36) |
|
|
13 | (2) |
|
2.2 Different Network Protocols |
|
|
15 | (3) |
|
2.3 Role of Internet Protocols in a Data Center |
|
|
18 | (2) |
|
2.4 Data Center Architecture and Connectivity |
|
|
20 | (1) |
|
2.5 Evolution of Enterprise IT |
|
|
21 | (1) |
|
2.6 Evolution of Web Services |
|
|
22 | (4) |
|
2.7 Server Operations in a Data Center |
|
|
26 | (4) |
|
2.8 Server-Based Web Services |
|
|
30 | (1) |
|
2.9 Evolution of Service-Oriented Architecture |
|
|
31 | (2) |
|
2.10 Transition from SOA to Cloud Computing |
|
|
33 | (1) |
|
2.11 Building an Enterprise SOA Solution |
|
|
34 | (2) |
|
2.12 Top-Down vs. Bottom-Up Approach |
|
|
36 | (2) |
|
2.13 Enterprise Service Bus (ESB) |
|
|
38 | (1) |
|
2.14 Enterprise Implementation on Private Cloud |
|
|
39 | (2) |
|
2.15 Enterprise Implementation on Hybrid Cloud |
|
|
41 | (1) |
|
2.16 Information Security Basic Concepts |
|
|
41 | (2) |
|
2.17 An Example of a Security Attack |
|
|
43 | (1) |
|
2.18 Cloud Software Security Requirements |
|
|
44 | (2) |
|
2.19 Rising Security Threats |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (2) |
|
|
48 | (1) |
|
3 Cloud Computing Pyramid |
|
|
49 | (12) |
|
3.1 Roots of Cloud Computing |
|
|
49 | (3) |
|
3.2 Essential Characteristics of Cloud Computing |
|
|
52 | (1) |
|
|
53 | (1) |
|
3.4 Cloud Players and Their Concerns |
|
|
54 | (2) |
|
3.5 Considerations for Cloud Data Centers |
|
|
56 | (2) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (3) |
|
|
59 | (2) |
|
4 Features of Private and Public Cloud |
|
|
61 | (14) |
|
4.1 Customer Expectations of Cloud Computing |
|
|
61 | (2) |
|
4.2 Interoperability of Cloud Computing |
|
|
63 | (1) |
|
4.3 System Failures, Diagnostics, and Recovery |
|
|
63 | (2) |
|
4.4 Reliability of Cloud Computing |
|
|
65 | (1) |
|
4.5 Performance of Cloud Computing |
|
|
66 | (1) |
|
|
67 | (4) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
|
73 | (2) |
|
5 Cloud Workload Characterization |
|
|
75 | (24) |
|
|
75 | (1) |
|
5.2 Some Background on Workload Characterization |
|
|
76 | (3) |
|
5.3 Top-Level Cloud Workload Categorization |
|
|
79 | (1) |
|
5.4 Cloud Workload Categories |
|
|
80 | (4) |
|
|
84 | (2) |
|
5.5.1 Data Busses Between Servers |
|
|
85 | (1) |
|
5.6 Example Workload Categorizations |
|
|
86 | (1) |
|
5.7 Temporal Variability of Workloads |
|
|
86 | (4) |
|
5.8 Low-Level or Hardware Metrics of Computer Utilization |
|
|
90 | (1) |
|
5.9 Dynamic Monitoring and Cloud Resource Allocation |
|
|
91 | (1) |
|
5.10 Benefits to Cloud Service Providers |
|
|
92 | (2) |
|
|
94 | (1) |
|
|
95 | (4) |
|
|
95 | (4) |
|
6 Cloud Management and Monitoring |
|
|
99 | (12) |
|
|
99 | (1) |
|
6.2 Introduction to Cloud Setup and Basic Tools |
|
|
99 | (1) |
|
6.3 Noisy Neighbors in a Cloud |
|
|
100 | (1) |
|
6.4 Cloud Management Requirements |
|
|
101 | (1) |
|
6.5 Essentials of Monitoring |
|
|
102 | (1) |
|
6.6 Some Example of Monitoring Tools |
|
|
103 | (2) |
|
6.7 Monitoring Use of Images and Their Security |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (2) |
|
|
109 | (2) |
|
7 Cloud Computing and Information Security |
|
|
111 | (32) |
|
7.1 Information Security Background, Information Context, and Definitions |
|
|
111 | (2) |
|
7.2 Evolution of Security Considerations |
|
|
113 | (2) |
|
7.3 Security Concerns of Cloud Operating Models |
|
|
115 | (1) |
|
7.4 Identity Authentication |
|
|
116 | (4) |
|
|
120 | (1) |
|
7.6 Secure Storage and Computation |
|
|
121 | (1) |
|
|
121 | (2) |
|
7.8 Traditional vs. Internet Security Issues |
|
|
123 | (2) |
|
7.9 Security Using Encryption Keys |
|
|
125 | (3) |
|
7.10 Challenges of Using Standard Security Algorithms |
|
|
128 | (1) |
|
7.11 Variations and Special Cases for Security Issues with Cloud Computing |
|
|
129 | (4) |
|
|
130 | (1) |
|
7.11.2 Secure Communication |
|
|
131 | (1) |
|
7.11.3 An Example of Security Scenario for Cloud Computing |
|
|
131 | (2) |
|
7.12 A Few Key Challenges Related to Cloud Computing and Virtualization |
|
|
133 | (1) |
|
7.13 Some Suggested Security Practices for Cloud Computing |
|
|
134 | (2) |
|
7.14 Side Channel Security Attacks in the Cloud |
|
|
136 | (2) |
|
7.15 An Introduction to Block Chain for Security |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
139 | (4) |
|
|
140 | (3) |
|
|
143 | (12) |
|
8.1 Cloud Business Models |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (2) |
|
8.5 Plugging IoT Devices in a Cloud |
|
|
148 | (3) |
|
8.6 Using Multi-party Cloud |
|
|
151 | (1) |
|
8.7 Software-Based Hardware Security Modules |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
154 | (1) |
|
9 Migrating a Complex Industry to Cloud |
|
|
155 | (18) |
|
|
155 | (1) |
|
|
156 | (1) |
|
9.3 A Brief History of EDA Tools and Flows |
|
|
157 | (3) |
|
9.3.1 The Nascent Years of the 1970s |
|
|
157 | (1) |
|
|
158 | (1) |
|
9.3.3 Growing Up in the 1990s |
|
|
158 | (1) |
|
9.3.4 Maturing into the First Decade of the Twenty-First Century |
|
|
159 | (1) |
|
9.3.5 From the 2010s Till Now: EDA Stable |
|
|
159 | (1) |
|
9.4 EDA Flow Steps Mapping to Cloud |
|
|
160 | (5) |
|
9.5 Considerations for Cloud Computing Adoption |
|
|
165 | (3) |
|
9.6 Applying Block Chain to Security |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (3) |
|
|
170 | (3) |
|
10 Cost and Billing Practices in Cloud |
|
|
173 | (20) |
|
10.1 Cloud as a Service (CaaS): The Billing Imperatives |
|
|
173 | (1) |
|
10.1.1 Cloud Business Practices |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
10.4 Amazon EC2 Motivations and Setup |
|
|
176 | (3) |
|
10.4.1 Amazon On-Demand Instances |
|
|
177 | (1) |
|
10.4.2 Amazon Spot Instances |
|
|
177 | (1) |
|
10.4.3 Amazon Reserved Instances |
|
|
178 | (1) |
|
10.4.4 Amazon Dedicated Instances and Dedicated Hosts |
|
|
178 | (1) |
|
10.5 Motivation and Methods for Right Sizing Customer VMs |
|
|
179 | (3) |
|
|
179 | (1) |
|
10.5.2 Elastic Load Balancing |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
182 | (3) |
|
10.7 Capacity Forecasting |
|
|
185 | (1) |
|
10.8 Optimizations Across Cloud |
|
|
186 | (2) |
|
10.9 Types of Cloud Service-Level Agreements |
|
|
188 | (2) |
|
|
190 | (1) |
|
|
190 | (3) |
|
|
191 | (2) |
|
11 Additional Security Considerations for Cloud |
|
|
193 | (24) |
|
|
193 | (2) |
|
|
195 | (1) |
|
11.3 Open Web Application Security Project |
|
|
196 | (2) |
|
11.4 Emergence of Edge Computing |
|
|
198 | (6) |
|
11.4.1 Status of Edge Computing Security and Recent Breaches |
|
|
199 | (1) |
|
11.4.2 Security Modeling Specifically Targeting Edge Computing |
|
|
200 | (4) |
|
11.5 Security Solutions for IoT Devices |
|
|
204 | (1) |
|
11.6 Metrics for Access Control Using Speaker Identification |
|
|
205 | (6) |
|
11.7 Real-Time Control of Cyber-Physical Systems |
|
|
211 | (3) |
|
|
214 | (1) |
|
|
214 | (3) |
|
|
214 | (3) |
|
12 Analytics in the Cloud |
|
|
217 | (18) |
|
12.1 Background and Problem Statement |
|
|
217 | (2) |
|
12.2 Introduction to MapReduce |
|
|
219 | (2) |
|
12.3 Introduction to Hadoop |
|
|
221 | (1) |
|
12.4 Usage of Amazon's MapReduce |
|
|
222 | (3) |
|
12.5 Twitter Sentimental Analysis Using Cloud |
|
|
225 | (1) |
|
12.6 IoT-Driven Analytics in Cloud |
|
|
226 | (2) |
|
12.7 Real-Time Decision-Making Support Systems |
|
|
228 | (2) |
|
12.8 Machine Learning in a Public Cloud |
|
|
230 | (1) |
|
12.9 Future Possibilities |
|
|
231 | (1) |
|
|
232 | (3) |
|
|
232 | (3) |
|
13 Future Trends in Cloud Computing |
|
|
235 | (26) |
|
13.1 Revisiting History of Computing |
|
|
235 | (1) |
|
13.2 Current Limitations of Cloud Computing |
|
|
235 | (2) |
|
13.3 Emergence of Internet of Things (IoT) |
|
|
237 | (1) |
|
13.4 Emergence of Machine Learning |
|
|
238 | (2) |
|
13.5 Emergence of Edge Computing |
|
|
240 | (1) |
|
13.6 Security Issues in Edge Computing |
|
|
241 | (1) |
|
13.7 Security Solutions for Edge Computing |
|
|
242 | (2) |
|
13.8 Example of an IoT-Based Cloud Service |
|
|
244 | (2) |
|
13.9 Hardware as the Root of Trust |
|
|
246 | (1) |
|
13.10 Security in Multi-party Cloud |
|
|
247 | (1) |
|
13.11 Privacy-Preserving Multi-party Analytics in a Cloud |
|
|
248 | (2) |
|
13.12 Hardware-Based Security Implementation |
|
|
250 | (3) |
|
13.13 Outsourced Computing Using Homomorphic Encryption |
|
|
253 | (1) |
|
13.14 Patching for Security |
|
|
254 | (2) |
|
13.15 Machine Learning for Security |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
258 | (3) |
|
|
258 | (3) |
|
14 A Quick Test of Your Cloud Fundamentals Grasp |
|
|
261 | (10) |
|
14.1 Multiple Choice Questions |
|
|
261 | (4) |
|
|
265 | (1) |
|
14.3 Answer Key for Multiple Choice Questions |
|
|
266 | (1) |
|
14.4 Answer Key for Detailed Questions |
|
|
267 | (2) |
|
14.5 Additional Challenging Questions |
|
|
269 | (2) |
|
15 Hands-On Project to Use Cloud Service Provider |
|
|
271 | (44) |
|
15.1 Project 1: Install Lamp Stack on Amazon EC2 |
|
|
271 | (21) |
|
15.1.1 Installing Lamp Web Server on AWS via EC2 |
|
|
271 | (10) |
|
15.1.2 Installing WordPress |
|
|
281 | (10) |
|
|
291 | (1) |
|
15.2 Project 2: Install PHP on Your AWS Instance |
|
|
292 | (1) |
|
15.3 Project 3: Enhance Security of Your Aws Instance |
|
|
293 | (2) |
|
15.4 Project 4: Set Up a Load Balancer for Your AWS Instance |
|
|
295 | (6) |
|
15.4.1 Elastic Load Balancer Setup |
|
|
295 | (5) |
|
15.4.2 Unique Features of AWS Load Balancer |
|
|
300 | (1) |
|
15.5 Project 5: Use Elastic IP for Your AWS Instance |
|
|
301 | (11) |
|
15.5.1 How to Make an Instance Elastic |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (10) |
|
|
312 | (1) |
|
15.7 Project 6: Encryption Strength of Key Size |
|
|
312 | (3) |
|
15.7.1 How to Evaluate Encryption Strength Based upon Factoring Keys |
|
|
312 | (3) |
Appendix A Points to Ponder |
|
315 | (22) |
Appendix B Additional Considerations for Cloud Computing |
|
337 | (8) |
Appendix C Suggested List of Additional Cloud Projects |
|
345 | (2) |
Appendix D Trust Models for IoT Devices |
|
347 | (6) |
Index |
|
353 | |