Cover image for Cloud management and security
Title:
Cloud management and security
Personal Author:
Publication Information:
Chichester, West Sussex, United Kingdom : Wiley, 2014
Physical Description:
xxii, 216 p. : ill. ; 25 cm.
ISBN:
9781118817094

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010335127 QA76.585 A235 2014 Open Access Book Book
Searching...

On Order

Summary

Summary

Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing.

In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples.

Part one presents the main components constituting the Cloud and federated Cloud infrastructure
(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem
- focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning - especially focusing on Cloud security.

Key Features

* Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security

* Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students

* Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice

* Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages

* Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing

* Provides a research roadmap to establish next-generation trustworthy Cloud computing

* Includes exercises and solutions to problems as well as PowerPoint slides for instructors


Author Notes

Dr. Imad M. Abbadi
University of Oxford, UK


Table of Contents

About the Authorp. xi
Prefacep. xiii
Acknowledgmentsp. xix
Acronymsp. xxi
1 Introductionp. 1
1.1 Overviewp. 1
1.2 Cloud Definitionp. 2
1.3 Cloud Evolutionp. 3
1.4 Cloud Servicesp. 4
1.5 Cloud Deployment Typesp. 6
1.6 Main Challenges of Cloudsp. 7
1.7 Summaryp. 9
1.8 Exercisesp. 10
Referencesp. 10
Part 1 Cloud Management
2 Cloud Structurep. 13
2.1 Introductionp. 13
2.2 Infrastructure Componentsp. 14
2.2.1 Storage Componentsp. 14
2.2.2 Physical Serversp. 14
2.2.3 Network Componentsp. 15
2.3 Cloud Layersp. 15
2.3.1 Vertical Slicesp. 15
2.3.2 Horizontal Slicesp. 17
2.3.3 Horizontal vs. Vertical Slicesp. 18
2.3.4 Illustrative Examplep. 20
2.4 Cloud Relationsp. 21
2.4.1 Intra-layer Relationsp. 21
2.4.2 Across-layer Relationsp. 23
2.5 Cloud Dynamicsp. 24
2.6 Data Typesp. 25
2.7 Summaryp. 26
2.8 Exercisesp. 27
Referencesp. 27
3 Fundamentals of Cloud Managementp. 29
3.1 Introductionp. 29
3.2 Clouds Management Servicesp. 30
3.2.1 Application Deployment Scenariop. 30
3.2.2 Identifying Cloud Management Servicesp. 33
3.3 Virtual Control Centerp. 35
3.4 Prerequisite Input Data for Management Servicesp. 37
3.5 Management of User Requirementsp. 38
3.5.1 Requirement Management Workflowp. 38
3.5.2 Challenges and Requirementsp. 40
3.5.3 Categories and Delegation of User Requirementsp. 42
3.5.4 Illustrative Examplep. 43
3.6 Summaryp. 44
3.7 Exercisesp. 45
Referencesp. 45
4 Cloud Propertiesp. 47
4.1 Introductionp. 47
4.2 Adaptability Propertyp. 48
4.3 Resilience Propertyp. 49
4.4 Scalability Propertyp. 50
4.5 Availability Propertyp. 51
4.6 Reliability Propertyp. 51
4.7 Security and Privacy Propertyp. 52
4.8 Business Modelp. 53
4.9 Summaryp. 54
4.10 Exercisesp. 54
Referencesp. 55
5 Automated Management Servicesp. 57
5.1 Introductionp. 57
5.2 Virtual Layer Self-managed Servicesp. 58
5.2.1 Adaptability as a Virtual Servicep. 58
5.2.2 System Architect as a Virtual Servicep. 59
5.2.3 Resilience as a Virtual Servicep. 59
5.2.4 Scalability as a Virtual Servicep. 59
5.2.5 Availability as a Virtual Servicep. 61
5.2.6 Reliability as a Virtual Servicep. 62
5.3 Virtual Services Interdependencyp. 63
5.4 Application Layer Self-managed Servicesp. 63
5.4.1 Adaptability as an Application Servicep. 63
5.4.2 Resilience as an Application Servicep. 63
5.4.3 Scalability as an Application Servicep. 66
5.4.4 Availability as an Application Servicep. 66
5.4.5 Reliability as an Application Servicep. 67
5.5 Application Services Interdependencyp. 67
5.6 Security and Privacy by Designp. 68
5.7 Multi-tier Application Deployment in the Cloudp. 70
5.7.1 Application Architecturep. 71
5.7.2 Managed Services Interactionp. 73
5.8 Main Challenges and Requirementsp. 75
5.8.1 Challengesp. 75
5.8.2 Requirementsp. 77
5.9 Summaryp. 77
5.10 Exercisesp. 78
Referencesp. 78
Part 2 Cloud Security Fundamentals
6 Backgroundp. 81
6.1 Topics Flowp. 81
6.2 Trusted Computingp. 83
6.2.1 Introductionp. 83
6.2.2 Trusted Platform Modulep. 83
6.2.3 TCG Main Componentsp. 84
6.2.4 The TP Main Functionsp. 86
6.2.5 Challenges in TCG Specificationsp. 90
6.3 Summaryp. 91
Referencesp. 91
7 Challenges for Establishing Trust in Cloudsp. 93
7.1 Introductionp. 93
7.2 Effects of Cloud Dynamism on Trust Relationshipsp. 94
7.2.1 Load Balancingp. 94
7.2.2 Horizontal Scalingp. 95
7.2.3 Vertical Scalingp. 96
7.2.4 Redundancyp. 96
7.2.5 Clusteringp. 97
7.3 Challengesp. 97
7.4 Summaryp. 98
7.5 Exercisesp. 99
Referencesp. 99
8 Establishing Trust in Cloudsp. 101
8.1 Introductionp. 101
8.2 Organization Requirementsp. 102
8.3 Framework Requirementsp. 102
8.4 Device Propertiesp. 105
8.5 Framework Architecturep. 105
8.5.1 Dynamic Domain Conceptp. 105
8.5.2 Proposed Architecturep. 106
8.6 Required Software Agentsp. 109
8.6.1 Server Agent Functionsp. 109
8.6.2 Client Agent Functionsp. 110
8.6.1 Server Agent Initializationp. 110
8.6.4 Client Agent Initializationp. 112
8.7 Framework Workflowp. 112
8.7.1 Management Domain and Collaborating Management Domain Establishmentp. 112
8.7.2 Organization Home Domain Establishmentp. 113
8.7.3 Adding Devices to a Domainp. 113
8.7.4 Outsourced Domain and Collaborating Outsourced Domain Establishmentp. 116
8.8 Discussion and Analysisp. 117
8.8.1 Benefits of Using Trusted Computingp. 117
8.8.2 Benefits of the Framework Architecturep. 117
8.8.3 Content Protectionp. 117
8.9 Summaryp. 118
8.10 Exercisesp. 118
Referencesp. 119
9 Clouds Chains of Trustp. 121
9.1 Introductionp. 121
9.2 Software Agents Revisionp. 122
9.3 Roots of and Chains of Trust Definitionp. 122
9.3.1 Roots of Trustp. 123
9.3.2 Chains of Trustp. 124
9.4 Intra-layer Chains of Trustp. 124
9.4.1 A Resource Chain of Trustp. 125
9.4.2 Compositional Chains of Trustp. 127
9.4.3 Physical Layer DCoT and CDCoTp. 128
9.4.4 Virtual Layer DCoT and CDCoTp. 129
9.4.5 Application Layer DCoT and CDCoTp. 130
9.5 Trust Across Layersp. 132
9.6 Summaryp. 134
9.7 Exercisesp. 135
Referencesp. 135
10 Provenance in Cloudsp. 137
10.1 Introductionp. 137
10.1.1 Log and Provenancep. 138
10.1.2 Problem Description and Objectivesp. 139
10.1.3 Organization of the Chapterp. 140
10.2 Motivating Scenariosp. 140
10.3 Log Records Management and Requirementsp. 142
10.3.1 Database Designp. 142
10.3.2 Security Requirementsp. 145
10.3.3 Other Requirements and Device Propertiesp. 145
10.4 Framework Domain Architecturep. 147
10.5 Framework Software Agentsp. 149
10.5.1 Cloud Server Agentp. 150
10.5.2 LaaS Server Agentp. 150
10.5.3 LaaS Client Agentp. 151
10.5.4 VM Agentp. 151
10.5.5 Cloud Client Agentp. 151
10.6 Framework Workflowp. 152
10.6.1 Cloud Server Agent Initializationp. 152
10.6.2 LaaS Server Agent Initializationp. 153
10.6.3 LCA and CCA Initializationp. 154
10.6.4 LaaS Domain Establishmentp. 154
10.6.5 Adding Devices to an LaaSDp. 155
10.6.6 Establishing Trust between Server Agentsp. 157
10.6.7 MD Establishment and Managementp. 159
10.6.8 Secure Log Storagep. 159
10.7 Threat Analysisp. 160
10.8 Discussion and Future Directionsp. 162
10.8.1 Establishing Trustp. 162
10.8.2 Log Retentionp. 163
10.8.3 Achievement of Objectivesp. 163
10.9 Summaryp. 164
10.10 Exercisesp. 164
Referencesp. 165
11 Insidersp. 167
11.1 Introductionp. 167
11.2 Insiders Definitionp. 168
11.2.1 Backgroundp. 168
11.2.2 Definitionp. 169
11.2.3 Rules of Identifying Insidersp. 171
11.3 Conceptual Modelsp. 172
11.3.1 Organizational Viewp. 172
11.3.2 Assets and Clientsp. 173
11.3.3 Infrastructure Modelp. 173
11.3.4 Procedure for Identifying Potential and Malicious Insidersp. 174
11.4 Summaryp. 175
11.5 Exercisesp. 175
Referencesp. 175
Part 3 practical Examples
12 Real-Life Examplesp. 179
12.1 OpenStackp. 179
12.1.1 What is OpenStack?p. 179
12.1.2 Openstack Structurep. 180
12.1.3 Security in OpenStackp. 184
12.1.4 OpenStack Configuration Filesp. 185
12.2 Amazon Web Servicesp. 185
12.3 Component Architecturep. 186
12.3.1 Nova-apip. 186
12.3.2 Nova-databasep. 188
12.3.3 Nova-schedulerp. 192
12.4 Prototypep. 192
12.4.1 Trust Attestation via the DC-Cp. 192
12.4.2 Trust Management by the DCSp. 195
12.5 Summaryp. 197
Referencesp. 198
13 Case Studyp. 199
13.1 Scenariop. 199
13.2 Home Healthcare Architecture in the Cloudp. 200
13.3 Insiders Analysis for Home Healthcarep. 201
13.3.1 Model Instancep. 201
13.3.2 Identifying Potential Insiders and Insidersp. 201
13.3.3 Insider Threat Analysisp. 205
13.4 Cloud Threatsp. 207
Referencesp. 212
Indexp. 213