Cloud computing and virtualization /

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then t...

Full description

Saved in:
Bibliographic Details
Online Access: Full text (MCPHS users only)
Other Authors: Le, Dac-Nhuong, 1983- (Editor), Kumar, Raghvendra, 1987- (Editor), Nguyen, Nhu Gia (Editor), Chatterjee, Jyotir Moy (Editor)
Format: Electronic eBook
Language:English
Published: Hoboken, NJ : Beverly, MA : John Wiley & Sons ; Scrivener Publishing, 2018
Subjects:
Local Note:ProQuest Ebook Central
Table of Contents:
  • Intro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References.
  • Chapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration.
  • 5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References.
  • Chapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security.
  • 8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time.