eBook Developing and Securing the Cloud, 1st Edition

  • Bhavani Thuraisingham
  • Published By: Auerbach Publications
  • ISBN-10: 1439862923
  • ISBN-13: 9781439862926
  • DDC: 004.67
  • Grade Level Range: College Freshman - College Senior
  • 730 Pages | eBook
  • Original Copyright 2013 | Published/Released March 2016
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price



Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies.Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds.Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas.This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.

Table of Contents

Front Cover.
Half Title Page.
Other Frontmatter.
Title Page.
Copyright Page.
1: Supporting Technologies.
2: From Mainframe to the Cloud.
3: Trustworthy Systems.
4: Data, Information, and Knowledge Management.
5: Conclusion to Part I.
Secure Services Technologies.
6: Service-Oriented Computing and Security.
7: Semantic Web Services and Security.
8: Specialized Web Services and Security.
9: Conclusion to Part II.
Cloud Computing Concepts.
10: Cloud Computing Concepts.
11: Cloud Computing Functions.
12: Cloud Data Management.
13: Specialized Clouds, Services, and Applications.
14: Cloud Service Providers, Products, and Frameworks.
15: Conclusion to Part III.
Experimental Cloud Computing Systems.
16: Experimental Cloud Query Processing System.
17: Social Networking on the Cloud.
18: Experimental Semantic Web-Based Cloud Computing Systems.
19: Conclusion to Part IV.
Secure Cloud Computing Concepts.
20: Secure Cloud Computing Concepts.
21: Secure Cloud Computing Functions.
22: Secure Cloud Data Management.
23: Secure Cloud Computing Guidelines.
24: Security as a Service.
25: Secure Cloud Computing Products.
26: Conclusion to Part V.
Experimental Secure Cloud Computing Systems.
27: Secure Cloud Query Processing with Relational Data.
28: Secure Cloud Query Processing with Semantic Web Data.
29: Secure Cloud-Based Information Integration.
30: Conclusion to Part VI.
Experimental Cloud Systems for Security Applications.
31: Cloud-Based Malware Detection for Evolving Data Streams.
32: Cloud-Based Data Mining for Insider Threat Detection.
33: Cloud-Centric Assured Information Sharing.
34: Design and Implementation of a Semantic Cloud-Based Assured Information Sharing System.
35: Conclusion to Part VII.
Toward a Trustworthy Cloud.
36: Trust Management and the Cloud.
37: Privacy and Cloud Services.
38: Integrity Management, Data Provenance, and Cloud Services.
39: Conclusion to Part VIII.
Building an Infrastructure, an Education Initiative, and a Research Program for a Secure Cloud.
40: An Infrastructure for a Secure Cloud.
41: An Education Program for a Secure Cloud.
42: A Research Initiative for a Secure Cloud.
43: Summary and Directions.
44: Conclusion to Part IX.
Appendix A: Data Management Systems— Developments and Trends.
Appendix B: Data Mining Techniques.
Appendix C: Access Control in Database Systems.
Appendix D: Assured Information Sharing Life Cycle.