You are previewing Enabling the New Era of Cloud Computing.
O'Reilly logo
Enabling the New Era of Cloud Computing

Book Description

Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level. Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Foreword
  6. Foreword
  7. Preface
    1. SHARED INFRASTRUCTURE
    2. DYNAMIC PROVISIONING
    3. NETWORK ACCESS
    4. MANAGED METERING
    5. SOFTWARE AS A SERVICE (SaaS)
    6. PLATFORM AS A SERVICE (PaaS)
    7. INFRASTRUCTURE AS A SERVICE (IaaS)
    8. OTHER CLOUD SERVICE MODELS
    9. PRIVATE CLOUD
    10. COMMUNITY CLOUD
    11. PUBLIC CLOUD
    12. HYBRID CLOUD
  8. Acknowledgment
  9. Section 1: Cloud Computing Overview
    1. Chapter 1: Cloud Computing Overview
      1. ABSTRACT
      2. THE HISTORY OF CLOUD COMPUTING
      3. CLOUD COMPUTING MODELS
      4. THE WAVE OF CLOUD TRANSFORMATION IN THE GLOBAL INFORMATION INDUSTRY
      5. EXPLORING THE CLOUD ERA MARKET DEMAND
      6. CONCLUSION
    2. Chapter 2: Main Components of Cloud Computing
      1. ABSTRACT
      2. CLOUD ERA INFORMATION HUB
      3. CLOUD ERA COMMUNICATION NETWORKS
      4. INTELLIGENT TERMINALS OF THE CLOUD ERA
      5. CLOUD COMPUTING AND THE INTERNET OF THINGS
      6. CONCLUSIONS AND LOOKING TO THE FUTURE
    3. Chapter 3: Cloud Infrastructure
      1. ABSTRACT
      2. VIRTUALIZATION OVERVIEW
      3. VIRTUALIZATION PROCESSES
      4. SERVER VIRTUALIZATION
      5. STORAGE VIRTUALIZATION
      6. NETWORK VIRTUALIZATION
      7. DESKTOP VIRTUALIZATION
  10. Section 2: Data Management and Data Security
    1. Chapter 4: Trusted Cloud Initiative Reference Architecture
      1. ABSTRACT
      2. OVERVIEW OF THE REFERENCE ARCHITECTURE
      3. HOW TO USE THE TCI REFERENCE ARCHITECTURE
      4. SECURITY AND RISK MANAGEMENT: PROTECTING DATA AND MANAGING RISK
      5. RELATIONSHIPS TO OTHER DOMAINS
      6. BUSINESS OPERATION SUPPORT SERVICES: PARTNERS WITH THE BUSINESS
      7. TECHNOLOGY SOLUTION DOMAINS
    2. Chapter 5: Security Information and Event Management Implementation Guidance
      1. ABSTRACT
      2. OVERVIEW
      3. REQUIREMENTS
      4. ARCHITECTURAL IMPLEMENTATION
      5. TECHNICAL IMPLEMENTATION
      6. APPENDIX: USEFUL LINKS
    3. Chapter 6: Enterprise Security Monitoring with the Fusion Center Model
      1. ABSTRACT
      2. EMERGING THREATS: ADVANCED ATTACKS
      3. PROBLEMS IN DEFENSE: INADEQUATE ACTIONABLE INFORMATION AND ORGANIZATIONAL SILOS
      4. COUNTERMEASURE SOLUTIONS: CROSS-BOUNDARY ENTERPRISE MONITORING
      5. MONITORING INFORMATION SHARING
      6. VISION: GLOBAL CORRELATION AND INTELLIGENCE
      7. CONCLUSION
    4. Chapter 7: Data Protection in the Cloud Era
      1. ABSTRACT
      2. INTRODUCTION
      3. UNDERSTANDING THE PROBLEM
      4. THE VISION: WHERE WE WANT TO BE
      5. THE STRATEGY: HOW WE GET THERE
      6. NEXT STEPS: CONSIDERATIONS FOR REFERENCE ARCHITECTURE
  11. Section 3: Data Storage and Big Data
    1. Chapter 8: Big Data Overview
      1. ABSTRACT
      2. INTRODUCTION
      3. BIG DATA DEFINITION
      4. BIG DATA CHARACTERISTICS
      5. BIG DATA VALUE
      6. BIG DATA STRUCTURE
      7. BIG DATA ANALYTICS
      8. THE BIG DATA ECOSYSTEM
    2. Chapter 9: Big Data Techniques, Tools, and Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BIG DATA TECHNOLOGIES
      4. BIG DATA APPLICATIONS
      5. BIG DATA SERVICES
  12. Section 4: Networking in the Cloud Era
    1. Chapter 10: Cloud Computing Networks
      1. ABSTRACT
      2. CLOUD COMPUTING OVERVIEW
      3. OPPORTUNITIES AND CHALLENGES OF CLOUD COMPUTING
      4. AKAMAI CDN TECHNOLOGY
      5. CDN EVALUATION IN THE MICROSOFT CLOUD
      6. FUTURE IMPROVEMENTS FOR THE CLOUD CDN
      7. CONCLUSION
    2. Chapter 11: Data Transfer and Storage in Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
    3. Chapter 12: Parallel Data Transfer Protocol
      1. ABSTRACT
      2. INTRODUCTION
      3. FORWARD ERROR CORRECTION
      4. PARALLEL DATA TRANSFER CHALLENGES
      5. CSTP: CROSS-STREAM TRANSFER PROTOCOL
      6. CSTP IMPLEMENTATION
      7. SCALE CSTP TO LARGE NUMBER OF STREAMS
      8. CONCLUSION
    4. Chapter 13: Border Adaptive Micro-Base-Station for Wireless Communications
      1. ABSTRACT
      2. INTRODUCTION
      3. ULTIMATE GOAL OF WIRELESS TELECOM: TO PROVIDE HOMOGENOUS SERVICE LEVEL COMPARABLE TO THE WIRED NETWORK
      4. UNDERSTANDING OF THE SHANNON THEORY FROM A NEW ANGLE
      5. ENHANCING THE MICRO-BASE-STATION PRINCIPLE TO THE EXTREME
      6. CENTRALIZED TIME DIVISION MULTIPLE ACCESS (CTDMA)
      7. PART-TIME WIRELESS NETWORK OPERATORS
      8. UNINTERRUPTED WIRELESS COMMUNICATION SERVICES DURING CATASTROPHES
      9. CONCLUSION
  13. Section 5: Appendix
    1. Chapter 14: Impact of Cultural Differences on the Cloud Computing Ecosystems in the USA and China
      1. INTRODUCTION
      2. CLOUD COMPUTING
      3. CULTURAL INFLUENCES ON INFORMATION TECHNOLOGY (IT)
      4. CULTURAL DIFFERENCES BETWEEN THE U.S. AND CHINA AND THEIR IMPACT ON CLOUD COMPUTING
      5. METHODOLOGY
      6. RESULTS
      7. SUPPORTING QUESTIONS AROUND CULTURE DIMENSIONS
      8. ANALYSIS
      9. CONCLUSION
    2. Chapter 15: Cloud Strategy Leads Innovation in China
      1. ABSTRACT
      2. INTRODUCTION
      3. A NEW GENERATION OF E-GOVERNMENT PLATFORM
      4. MICRO-ENTREPRENEURSHIP AND CIVILIAN INNOVATION
      5. CONCLUSION AND OUTLOOK
  14. Compilation of References
  15. About the Contributors