0%

Book Description

Explores key challenges and solutions to assured cloud computing today and provides a provocative look at the face of cloud computing tomorrow

This book offers readers a comprehensive suite of solutions for resolving many of the key challenges to achieving high levels of assurance in cloud computing. The distillation of critical research findings generated by the Assured Cloud Computing Center of Excellence (ACC-UCoE) of the University of Illinois, Urbana-Champaign, it provides unique insights into the current and future shape of robust, dependable, and secure cloud-based computing and data cyberinfrastructures.

A survivable and distributed cloud-computing-based infrastructure can enable the configuration of any dynamic systems-of-systems that contain both trusted and partially trusted resources and services sourced from multiple organizations. To assure mission-critical computations and workflows that rely on such systems-of-systems it is necessary to ensure that a given configuration does not violate any security or reliability requirements. Furthermore, it is necessary to model the trustworthiness of a workflow or computation fulfillment to a high level of assurance. In presenting the substance of the work done by the ACC-UCoE, this book provides a vision for assured cloud computing illustrating how individual research contributions relate to each other and to the big picture of assured cloud computing. In addition, the book:

  • Explores dominant themes in cloud-based systems, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance
  • Synthesizes heavily cited earlier work on topics such as DARE, trust mechanisms, and elastic graphs, as well as newer research findings on topics, including R-Storm, and RAMP transactions
  • Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming
Bringing together the freshest thinking and applications in one of today’s most important topics, Assured Cloud Computing is a must-read for researchers and professionals in the fields of computer science and engineering, especially those working within industrial, military, and governmental contexts. It is also a valuable reference for advanced students of computer science. 

Table of Contents

  1. Cover
  2. Series Page
  3. Title Page
  4. Copyright
  5. Preface
    1. Reference
  6. Editors' Biographies
  7. List of Contributors
  8. Chapter 1: Introduction
    1. 1.1 Introduction
    2. 1.2 Overview of the Book
    3. References
  9. Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude
    1. 2.1 Introduction
    2. 2.2 Apache Cassandra
    3. 2.3 Formalizing, Analyzing, and Extending Google's Megastore
    4. 2.4 RAMP Transaction Systems
    5. 2.5 Group Key Management via ZooKeeper
    6. 2.6 How Amazon Web Services Uses Formal Methods
    7. 2.7 Related Work
    8. 2.8 Concluding Remarks
    9. Acknowledgments
    10. References
  10. Chapter 3: Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud
    1. 3.1 Introduction
    2. 3.2 Vision: Using Cloud Technology in Missions
    3. 3.3 State of the Art
    4. 3.4 System Model
    5. 3.5 Game Model
    6. 3.6 Game Analysis
    7. 3.7 Model Extension and Discussion
    8. 3.8 Numerical Results and Analysis
    9. 3.9 The Future
    10. References
  11. Chapter 4: Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control
    1. 4.1 Introduction
    2. 4.2 Vision: Using Cloud Technology in Missions
    3. 4.3 State of the Art
    4. 4.4 Dynamic VM Monitoring Using Hypervisor Probes
    5. 4.5 Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring
    6. 4.6 Identifying Compromised Users in Shared Computing Infrastructures
    7. 4.7 Integrating Attribute-Based Policies into Role-Based Access Control
    8. 4.8 The Future
    9. References
  12. Chapter 5: Scalability, Workloads, and Performance: Replication, Popularity, Modeling, and Geo-Distributed File Stores
    1. 5.1 Introduction
    2. 5.2 Vision: Using Cloud Technology in Missions
    3. 5.3 State of the Art
    4. 5.4 Data Replication in a Cloud File System
    5. 5.5 Summary
    6. 5.6 The Future
    7. References
  13. Chapter 6: Resource Management: Performance Assuredness in Distributed Cloud Computing via Online Reconfigurations
    1. 6.1 Introduction
    2. 6.2 Vision: Using Cloud Technology in Missions
    3. 6.3 State of the Art
    4. 6.4 Reconfigurations in NoSQL and Key-Value Storage/Databases
    5. 6.5 Scale-Out and Scale-In Operations
    6. 6.6 Priorities and Deadlines in Batch Processing Systems
    7. 6.7 Summary
    8. 6.8 The Future
    9. References
  14. Chapter 7: Theoretical Considerations: Inferring and Enforcing Use Patterns for Mobile Cloud Assurance
    1. 7.1 Introduction
    2. 7.2 Vision
    3. 7.3 State of the Art
    4. 7.4 Code Offloading and the IMCM Framework
    5. 7.5 Coordinating Actors
    6. 7.6 Session Types
    7. 7.7 The Future
    8. Acknowledgments
    9. References
  15. Chapter 8: Certifications Past and Future: A Future Model for Assigning Certifications that Incorporate Lessons Learned from Past Practices
    1. 8.1 Introduction
    2. 8.2 Vision: Using Cloud Technology in Missions
    3. 8.3 State of the Art
    4. 8.4 Comparison among Standards
    5. 8.5 The Future
    6. References
  16. Chapter 9: Summary and Future Work
    1. 9.1 Survivability
    2. 9.2 Risks and Benefits
    3. 9.3 Detection and Security
    4. 9.4 Scalability, Workloads, and Performance
    5. 9.5 Resource Management
    6. 9.6 Theoretical Considerations: Inferring and Enforcing Use Patterns for Mobile Cloud Assurance
    7. 9.7 Certifications
    8. References
  17. Index
  18. End User License Agreement
13.58.16.120