Cloud Computing and Services Science下载

weixin_39821051 2019-08-03 12:30:20
Cloud Computing and Services Science,里边有目录,每章一个pdf
相关下载链接://download.csdn.net/download/zhanliqing/4266057?utm_source=bbsseo
...全文
18 回复 打赏 收藏 转发到动态 举报
AI 作业
写回复
用AI写文章
回复
切换为时间正序
请发表友善的回复…
发表回复
The purpose of 2017 International Conference on Security with Intelligent Computing and Big-data Services (SICBS’17 for short) with joined workshops, Workshop on Information and Communication Security Science and Engineering and Workshop on Security in Forensics, Medical, and Computing Services and Applications, is to provide a platform for researchers, engineers, academicians, as well as industrial professionals from all over the world to present their research results and development activities in security-related areas. It also aims at strengthening the international academic cooperation and communications and exchanging research ideas. It is the first SICBS. We wish that it could be then kept continued to the second SICBS as this 2017 successful academic activity. This SICBS 2017 brought together researchers from all regions around the world working on a variety of fields and provided a stimulating forum for them to exchange ideas and report on their progress in researches. In the conference including the two workshops, we collect 34 papers, covering the topics as follows: Algorithms and Security Analysis, Cryptanalysis and Detection Systems, IoT and E-commerce Applications, Privacy and Cloud Computing, Information Hiding and Secret Sharing, Network Security and Applications, Digital Forensics and Mobile Systems, Public Key Systems and Data Processing, and Blockchain Applications in Technology. Organization of conferences is a hard work. It would not have been possible without the exceptional commitment of many expert volunteers. We would like to thank all those who contributed to the advisory committee, the technique program committee, and the organizing committee for their efforts in the course of confer- ence preparations. We also give our most thanks to all the authors of the submitted papers to make this conference successful in the good paper quality for presenta- tions. We are grateful to Springer for publishing the proceedings.
Cloud computing is a novel computing paradigm which has changed the way enterprise or Internet computing is performed. Today, for almost all the sectors in the world, cloud computing is synonym to on-demand provisioning and delivery of IT services in a pay-as-you-go model. The success story of cloud computing as a technology is credited to the long-term efforts of computing research community across the globe. Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) are the three major cloud product sectors. Each one of these product sectors has their effects and reaches to various industries. If forecasts are to be believed, then more than two-third of all the enterprises across the globe will be entirely run in cloud by 2026. These enthusiastic figures have led to huge funding for research and development in cloud computing and related technologies. University researchers, research labs in industry, and scholars across the globe have recreated the whole computing world into a new cloud enabled world. This has been only possible by coordinated efforts into this direction. Today, almost every university across the globe has cloud computing and its related technologies included in their computer science curriculum. Additionally, there are extensive efforts on innovation and technology creation in the direction of cloud computing. These efforts are much visible in the reputed cloud computing research platforms like international conferences and journals. We feel that there is a significant need to systematically present quality research findings of recent advances in cloud computing for the benefit of community of researchers, educators, practitioners, and industries. Although there are large numbers of journals and conferences available, there is a lack of comprehensive and in-depth tutored analysis on various new developments in the field of cloud computing. This book on “Research Advances in Cloud Computing” discusses various new trends, designs, implementations, outcomes, and directions in the various areas of cloud computing. This book has been organized into three sections: 1. Programming model, infrastructure, and runtime 2. Resource Management 3. Security. The first chapter on “Serverless Computing: Current Trends and Open Problems” covers various serverless platforms, APIs, their key characteristics, technical challenges, and related open problems. Recently, enterprise application architectures are shifting to containers and micro-services, and it provides enough reasons for serverless computing. The chapter provides detailed requirements of different pro- gramming models, platforms, and the need of significant research and development efforts to make it matured enough for widespread adoption. Cloud providers face the important challenge regarding resource management and aim to provide services with high availability relying on finite computational resources and limited physical infrastructure. Their key challenge is to manage resources in an optimal way and to estimate how physical and logical failures can impact on users’ perception. The second chapter on “Highly Available Clouds: System Modeling, Evaluations and Open Challenges”, presents literature survey on high availability of cloud and mentions the main approaches for it. It explores computational modeling theories to represent a cloud infrastructure focusing on how to estimate and model cloud availability. The third chapter on “Big Data Analytics in Cloud—A Streaming Approach” discusses streaming approach for data analytics in cloud. Big data and cloud have become twin words—used sometimes interchangeably. Interpretation of big data brings in idea of mining and analytics. There is significant literature on cloud that discusses infrastructure and architecture but a very little literature for algorithms required for mining and analytics. This chapter focuses on online algorithms that can be used for distributed, unstructured data for learning and analytics over Cloud. It also discusses their time complexity, presents architecture for deploying them over cloud, and concludes with presenting relevant open research directions. Cloud data centers must be capable to offer scalable software services, which require an infrastructure with a significant amount of resources. Such resources are managed by specific software to ensure service-level agreements based on one or more performance metrics. Within such infrastructure, approaches to meet non-functional requirements can be split into various artifacts, distributed across different operational layers, which operate together with the aim of reaching a specific target. Existing studies classify such approaches using different terms, which usually are used with conflicting meanings by different people. Therefore, it is necessary a common nomenclature defining different artifacts, so they can be organized in a more scientific way. The fourth chapter on “A Terminology to Classify Artifacts for Cloud Infrastructure” proposes a comprehensive bottom-up classification to identify and classify approaches for system artifacts at the infras- tructure level, and organize existing literature using the proposed classification. The fifth chapter focuses on “Virtual Networking with Azure for Hybrid Cloud Computing in Aneka”. It provides a discussion on the need of inter-cloud com- munication in the emerging hybrid, public, or federated clouds. Later, they provide user and provider constraints. It also covers two practical cases to illustrate the theoretical concepts of resource allocation as well as have discussed the open challenges that resource management will face in the coming years. The tenth chapter on “Recent Developments in Resource Management in Cloud Computing and Large Computing Clusters” provides a comprehensive and detailed overview of overall cloud computing resource allocation framework with a focus on various resource scheduling algorithms. This chapter also provides a definitive direction toward cloud scheduling solutions, architectures, and fairness algorithms. The eleventh chapter on “Resource Allocation for Cloud Infrastructures: Taxonomies and Research Challenges” provides a classification of VM place- ments solutions in the form of taxonomies. These taxonomies are prepared for conceptualization of VM placement problem as provider–broker setting, and framing it as an optimization problem. Authors also comment on the formation of cloud markets to provide a basis for multi-objective VM placement algorithms. The twelth chapter on “Many-Objective Optimization for Virtual Machine Placement in Cloud Computing” presents a comprehensive discussion on virtual machine placement problem and extends the discussion by proposing many objec- tive VM placement algorithms for initial VM placement and reconfiguration. It also gives an overview of open research problems at the end of the chapter to provide the scope of future work toward fully dynamic multi-objective VM placement problems. The thirteenth chapter on “Performance Modeling and Optimization of Live Migration of Virtual Machines in Cloud Infrastructure” is based on improvement of the pre-copy algorithm for live migration system. The improved pre-copy algorithm is developed by three models: (i) compression model, (ii) prediction model, and (iii) performance model. Each model is used to evaluate downtime and total migration time of different workloads. The first model performs migration of different sizes of VM with three workloads: (i) idle system, (ii) kernel compile, and (iii) static web server. Prediction model works with adaptive dirty rate and adaptive data rate to evaluate complex workloads running in a VM. The performance model is used to find dirty pages using dirty page rate model. It is observed that both prediction model and performance model work efficiently than the existing framework of Xen. It concludes that three proposed models are able to improve pre-copy and the results are tested for the same. Security and privacy being a very active and hot topic of research and discussion these days, we have five chapters dedicated to the relevant issues associated with cloud computing security. Isolated containers are rapidly becoming a great alter- native to traditional virtualized environments. The fourteenth chapter on “Analysis of Security in Modern Container Platforms” makes two important contributions. First, it provides a detailed analysis of current security arrangements in the con- tainer platforms. Second, it offers an experimental analysis of containers by pro- viding details on common threat and Vulnerabilities Exposures (CVEs) exploits. This twofold analysis helps in comparing the CVE exploits to be able to compare with the state-of-the-art security requirements by the popular literature. The fifteenth chapter on “Identifying Evidence for Cloud Forensic Analysis” discusses forensic analysis and post-attack evidence collection on the cloud computing infrastructures. Authors describe the evidence collection activity at three different places which are at Intrusion Detection System (IDS), cloud provider API calls, and VM system calls. It shows a step-by-step attack scenario reconstruction using the proposed prolog-based tool following the proposed evidence collection approach. Forensic analysis of cloud computing infrastructures is still in its infancy and authors provide directions for data collection and forensically capable clouds. The sixteenth chapter on “An Access Control Framework for Secure and Interoperable Cloud Computing Applied to the Healthcare Domain” addresses various health record security issues and provides an FSICC framework (Framework for Secure and Interoperable Cloud Computing) that provides a mechanism for multiple sources to register cloud, programming, and web services and security requirements for use by applications. Future research directions are provided at the end of this chapter to help the enthusiastic readers about the open areas. The seventeenth chapter on “Security and Privacy Issues in Outsourced Personal Health Record” provides a detailed survey on existing personal health record management systems (PHRMSs) considering the security and privacy features provided by each one of them. This state-of-the-art survey is extended by giving pointers to multiple open research problems in the healthcare domain. The last in the series of five chapters dedicated to cloud security is a chapter on “Applications of Trusted Computing in Cloud Context”. Trusted computing para- digm has been considered as one of the important security research milestones to leverage various security solutions. This chapter investigates applications of trusted computing in cloud computing areas where security threats exist, namely in live virtual machine migration.
Look around the textbook market and you will nd countless books on computer networks, data communication, and the Internet. Why did we write this textbook? We generally see these books taking one of three forms. The rst are the computer science and business-oriented texts that are heavy on networking theory and usage with little emphasis on practical matters. They cover Transmission Control Protocol/Internet Protocol (TCP/IP), Internet servers, and the foundations for telecommunications but do not provide guidance on how to implement a server. The second are the books that take the opposite approach: strictly hands-on texts with little to know the theory or foun- dational material. In teaching computer information technology courses, we have found numerous books that instruct students on how to con gure a server but not on how the server actually works. Finally, there are books on socket-level programming. This textbook attempts to combine the aspects of the rst and second groups mentioned previ- ously. We do so by dividing the material roughly into two categories: concept chapters and case study chapters. We present networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers and their uses. For many of the concepts covered, we follow them with case study chapters that examine how to install, con gure, and secure a server that offers the given service discussed. This textbook can be used in several different ways for a college course. As a one-semester introduction to computer networks, teachers might try to cover the rst ve chapters. These chapters introduce local area networks (LANs), wide area networks (WANs), wireless LANs, tools for exploring networks, and the domain name system. Such a course could also spotlight later topics such as the Hypertext Transfer Protocol (HTTP) and cloud computing. A two-semester sequence on networks could cover the entire book, although some of the case studies might be shortened if the course is targeting computer science or business students as that audience may not to know servers such as Apache and Squid in depth. A computer information technology course might cover the case studies in detail while covering the concept chapters as more of an overview. Finally, an advanced networking course might cover Domain Name System (DNS) (Chapter 5), HTTP (Chapter 7), proxy servers (Chapter 9), and cloud computing (Chapters 11 and 12). As we wrote this textbook, it evolved several times. Our original intention was to write a book that would directly support our course CIT 436/536 (Web Server Administration). As such, we were going to cover in detail the Bind DNS name server, the Apache web server, and the Squid proxy server. However, as we wrote this book, we realized that we should provide background on these servers by discussing DNS, Dynamic Host Con guration Protocol, HTTP, HTTP Secure, digital certi cates and encryption, web caches, and the variety of protocols that support web caching. As we expanded the content of the text, we decided that we could also include introductory networking content as well as advanced Internet content, and thus, we added chapters on networks, LANs and WANs, TCP/IP, TCP/IP tools, cloud computing, and an examination of the Amazon Cloud Service. The book grew to be too large. Therefore, to offset the cost of a longer textbook, we have identi- ed the content that we feel could be moved out of the printed book and made electronically avail- able via the textbook’s companion website. Most of the items on the website are not optional reading but signi cant content that accompanies the chapters that it was taken from. You will nd indicators throughout the book of additional readings that should be pursued. xvii xviii Preface In addition to the text on the website, there are a number of other useful resources for faculty and students alike. These include a complete laboratory manual for installing, con guring, securing, and experimenting with many of the servers discussed in the text, PowerPoint notes, animation tuto- rials to illustrate some of the concepts, two appendices, glossary of vocabulary terms, and complete input/output listings for the example Amazon cloud operations covered in Chapter 12. https://www.crcpress.com/Internet-Infrastructure-Networking-Web-Services-and-Cloud- Computing/Fox-Hao/p/book/9781138039919

13,656

社区成员

发帖
与我相关
我的任务
社区描述
CSDN 下载资源悬赏专区
其他 技术论坛(原bbs)
社区管理员
  • 下载资源悬赏专区社区
加入社区
  • 近7日
  • 近30日
  • 至今
社区公告
暂无公告

试试用AI创作助手写篇文章吧