Developing and Securing the Cloud Front Cover

Developing and Securing the Cloud

  • Length: 730 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2013-10-28
  • ISBN-10: 1439862915
  • ISBN-13: 9781439862919
  • Sales Rank: #5186416 (See Top 100 Books)
Description

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.

Filling this void, Developing and Securing the Cloud providesa comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies.

Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds.

Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today’s cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas.

This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it’s best to build their own clouds or contract them out.

Table of Contents

Chapter 1: Introduction
Chapter 2: From Mainframe to the Cloud
Chapter 3: Trustworthy Systems
Chapter 4: Data, Information, and Knowledge Management
Chapter 5: Service-Oriented Computing and Security
Chapter 6: Semantic Web Services and Security
Chapter 7: Specialized Web Services and Security
Chapter 8: Cloud Computing Concepts
Chapter 9: Cloud Computing Functions
Chapter 10: Cloud Data Management
Chapter 11: Specialized Clouds, Services, and Applications
Chapter 12: Cloud Service Providers, Products, and Frameworks
Chapter 13: Experimental Cloud Query Processing System
Chapter 14: Social Networking on the Cloud
Chapter 15: Experimental Semantic Web-Based Cloud Computing Systems
Chapter 16: Secure Cloud Computing Concepts
Chapter 17: Secure Cloud Computing Functions
Chapter 18: Secure Cloud Data Management
Chapter 19: Secure Cloud Computing Guidelines
Chapter 20: Security as a Service
Chapter 21: Secure Cloud Computing Products
Chapter 22: Secure Cloud Query Processing with Relational Data
Chapter 23: Secure Cloud Query Processing with Semantic Web Data
Chapter 24: Secure Cloud-Based Information Integration
Chapter 25: Cloud-Based Malware Detection for Evolving Data Streams
Chapter 26: Cloud-Based Data Mining for Insider Threat Detection
Chapter 27: Cloud-Centric Assured Information Sharing
Chapter 28: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System
Chapter 29: Trust Management and the Cloud
Chapter 30: Privacy and Cloud Services
Chapter 31: Integrity Management, Data Provenance, and Cloud Services
Chapter 32: An Infrastructure for a Secure Cloud
Chapter 33: An Education Program for a Secure Cloud
Chapter 34: A Research Initiative for a Secure Cloud
Chapter 35: Summary and Directions

Appendix A: Data Management Systems—Developments and Trends
Appendix B: Data Mining Techniques
Appendix C: Access Control in Database Systems
Appendix D: Assured Information Sharing Life Cycle

To access the link, solve the captcha.