Normal view MARC view ISBD view

Cloud computing and virtualization / edited by Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee.

Contributor(s): Le, Dac-Nhuong, 1983- [editor.] | Kumar, Raghvendra, 1987- [editor.] | Nguyen, Nhu Gia [editor.] | Chatterjee, Jyotir Moy [editor.].
Material type: materialTypeLabelBookPublisher: Hoboken, NJ : Beverly, MA : John Wiley & Sons ; Scrivener Publishing, 2018Description: 1 online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781119488125; 1119488125; 9781119488088; 1119488087; 9781119488149; 1119488141; 1119487900; 9781119487906.Subject(s): Virtual computer systems -- Security measures | Cloud computing | COMPUTERS -- Computer Literacy | COMPUTERS -- Computer Science | COMPUTERS -- Data Processing | COMPUTERS -- Hardware -- General | COMPUTERS -- Information Technology | COMPUTERS -- Machine Theory | COMPUTERS -- Reference | Cloud computing | Virtual computer systemsGenre/Form: Electronic books.Additional physical formats: Print version:: Cloud computing and virtualization.DDC classification: 004.67/82 Online resources: Wiley Online Library
Contents:
Intro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References.
Chapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration.
5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.
Chapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security.
8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time.
Summary: The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective.
    average rating: 0.0 (0 votes)
No physical items for this record

Print version record and CIP data provided by publisher; resource not viewed.

Includes bibliographical references and index.

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective.

Intro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References.

Chapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration.

5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.

Chapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security.

8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time.

There are no comments for this item.

Log in to your account to post a comment.