Cloud Computing Solutions

Здесь есть возможность читать онлайн «Cloud Computing Solutions» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cloud Computing Solutions: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cloud Computing Solutions»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

CLOUD COMPUTING SOLUTIONS
The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems.
Audience

Cloud Computing Solutions — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cloud Computing Solutions», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

This book covers a wide range of cloud computing-related technologies. The wide-ranging contents will differentiate this book from others. The topics are likely to be embedded with various aspects of cloud business model-enabled technologies. It aims to provide the concepts of related technologies based on novel findings of the researchers through its chapter organization. The primary audience for the book includes specialists, researchers, undergraduate students, designers, experts and engineers who are occupied with research.

The book is organized in independent chapters to provide greater readability, adaptability and flexibility to readers.

Souvik Pal

Dac-Nhuong Le

Prasant Kumar Pattnaik

Preface

Recently, cloud computing has been one of the emerging technologies in the fields of computer science and information technology (IT). The advancement of cloud computing has resulted from the fast-growing use of the internet among people. This book is intended for readers who have no prior knowledge of this subject. Some topics in this book are unique and based on published information, both current and timely, which will be helpful to research scholars as well as specialists working in cloud computing-related issues. It is suitable as an introductory text for a semester-length course in cloud computing for undergraduate and postgraduate science courses in computer science and information technology. The authors decided to work on an introductory textbook on this subject for the benefit of students and teachers. Some topics in this book are unique and based on published information which is both current and timely.

The key features of the book are as follows:

Discusses the evolution of cloud computing from grid computing, cluster computing, and distributed system.

Provides coverage of cloud computing environments and popular views of them.

Incorporates a survey of the virtualization environment and its latest developments.

Discusses live migration, database, auditing and applications as part of the materials related to cloud computing.

Provides concepts of cloud storage, cloud strategy planning and management, cloud security and privacy issues.

Explains complex concepts in a very simple manner.

Covers information appropriate for beginners as well as advanced users.

Presents information using layman’s terms and clear language.

Widely covers the latest topics.

Extensively uses analogies.

Souvik PalDac-Nhuong LePrasant Kumar PattnaikMarch 2022

Acknowledgments

First of all, we would like to thank all our colleagues and friends for sharing our happiness at the start of this project and following up with their encouragement when it seemed too difficult to complete. We are thankful to all the members of Scrivener Publishing, especially Martin Scrivener and Phillip Carmical, for giving us the opportunity to write this book.

Dr. Pal is grateful to his father, Prof. Bharat Kumar Pal, and mother, Smt. Tandra Pal, for their blessings and constant support. He is also grateful to his grandmother, the late Sakhi Rani Pal, and grandfater, the late Ajit Kumar Pal, for their affection and motivation. He is thankful to his beloved wife, Smita, and son, Binayak, for their love and encouragement.

Dr. Dac-Nhuong Le would like to acknowledge and thank the most important people in his life, his patents and his partner, for their support. This book has been a long-cherished dream which would not have been turned into reality without the support and love of these amazing people, who encouraged him with the right amount of time and attention. He is also grateful to his best friends for their blessings and unconditional love, patience and encouragement.

Prof. Pattnaik is grateful to his father, the late Ramanarayan Patnaik, his mother, Smt. Jayalakshimi Patnaik, his father-in-law, Er. Chittaranjan Mohanty, and mother-in-law, the late Renubala Mohanty, for their blessings. He is also thankful to his wife, Bismita, and daughter, Prasannakshi, for their love and support.

And above all, the God Almighty.

Souvik PalDac-Nhuong LePrasant Kumar Pattnaik

Acronyms

5G The Next (5 th ) Generation
ACID Atomicity, Consistency, Isolation, Durability
ACL Access Control List
AI Artificial Intelligence
AIIOT Artificial Intelligence and Internet of Things
AKS Azure Kubernetes Service
ALB Adaptive Load Balancing
AMQP Advanced Message Queuing Protocol
ANSI American National Standards Institute
API Application Programming Interface
ARP Address Resolution Protocol
ARPA Advanced Research Projects Agency
AS Autonomous System
ATL Atlas Transformation Language
AWS Amazon Web Services
BGP Border Gateway Protocol
BSM Business Service Management
BSP Business Service Provider
BSON Binary JSON
CAA Cloud Application Architecture
CAM Content Addressable Memory
CAP Consistency, Availability, and Partition
CapEx Capital Expenditure
CC Cluster Controller
CDP Continuous Data Protection
CDS Content Delivery Servers
CCE Cloud Computing Environment
CERN European Organization for Nuclear Research
CFI Control Flow Integrity
CIDR Classless Inter-Domain Routing
CIS Cloud Information Service
CLC Cloud Controller
CMR Customer Relationship Management
CODINE Computing in Distributed Networked Environments
COI Community of Interest
CPA Cloud Platform Architecture
CPU Central Processing Unit
CSA Cloud Protection Alliance
CSLB Central Scheduler Load Balancing
CSP Cloud Service Provider
DAM Database Activity Monitoring
DaaS Database as a Service
DBMS Database Management System
DCE Data Center Efficiency
DC Distributed Computing
DDoS Distributed Denial of Service
DoS Denial of Service
DHCP Dynamic Host Configuration Protocol
DLP Data Loss Prevention
DNS Domain Name Server
DNSSEC Domain Name System Security Extensions
DPM Distributed Power Management
DRS Distributed Resource Scheduler
DSM Distributed Shared Memory
DVFS Dynamic Frequency Voltage Scaling
ECMP Equal-Cost Multi-Path
EC2 Elastic Compute Cloud
ECN Explicit Congestion Notification
EPPKS Efficient Privacy Preserving Keyword Search Scheme
FAM File Activity Monitoring
FGBI Fine-Grained Block Identification
FCAPS Fault, Configuration, Account, Performance, Security
FC Fiber Channel
FC-SAN FC-Based Storage Area Networks
GA Genetic Algorithm
GAE Google App Engine
GVMI Generic Virtual Machine Image
GOC Green Open Cloud
GPS Global Positioning System
GPLv2 General Public License
GUI Graphical User Interface
HA Homomorphic Authenticator
HDFS Hadoop Distributed File System
HMAC Hash Message Authentication Code
HIPS Host Intrusion Prevention System
HME Hypervisor Monitoring Environment
HPC Hardware Performance Computing
HTTP Hypertext Transfer Protocol
HVM Hardware-Assisted Virtual Machine
IaaS Infrastructure as a Service
IDC international Information Enterprise
IDS Intrusion Detection System
IDS/IPS Intrusion Detection System/Intrusion Prevention System
IMA Integrity Management Architecture
IoT Internet of Things
IP Internet Protocol
IPsec IP-Level Security
IPS Intrusion Prevention System
IRM In-Lined Reference Monitors
ISA Instruction Set Architecture
IT Information Technology
I/O Input/Output
JSON JavaScript Object Notation
KVM Kernel-Based Virtual Machine
KBA Knowledge-Based Answers/Questions
LAN Local Area Network
LGPL Lesser General Public License
LLFC Link Layer Flow Control
LLM Lightweight Live Migration
LVM Logical Volume Manager
LVMM Live Virtual Machine Migration
MaaS Model as a Service
MAC Media Access Control
MCC Mobile Cloud Computing
MFA Multi-Factor Authentication
MiTM Man-in-the-Middle Attack
MP Microprocessor
MPI Message Passing Interface
MPLS Multi-Protocol Label Switching
MSN Mobile Social Networking
MVCC Multi-Version Concurrency Control
NAS Network-Attached Storage
NAC Network Access Control
NC Node Controller
NFS Network File Server
NSF National Science Foundation
NSFC National Natural Science Foundation of China
NIPS Network Intrusion Prevention System
NIC Network Interface Controller
NoSQL Not-only-SQL
NOW Networks of Workstations
NICs Network Interface Cards
NRDC Natural Resources Defense Council
OCR Optical Character Recognition
OLTP Online Transaction Processing
ONF Open Networking Foundation
OS Operating System
OSG Object Storage Gateway
OSP Object Storage Provider
OVS Open vSwitch
P2P Peer-to-Peer
PaaS Platform as a Service
PAP Policy Access Points
PC Personal Computer
PCB Process Control Block
PDT Performance Degradation Time
PDP Policy Decision Points
PEP Policy Enforcement Points
PKI Public Key Infrastructure
PMC Performance Monitoring Counters
POR Proof of Retrievability
POC Proof of Concept
PPW Performance Per Watt
PUE Power Usage Effectiveness
PVM Parallel Virtual Machine
PV Public Verifiability
QoS Quality of Service
RaaS Resources as a Service
RBAC Role-Based Access Control
RDBMS Relationship Database Management System
RDPC Remote Data Processing Scheme
RDS Relational Database System
RED Random Early Detection
RLE Run-Length Encoding
RPC Remote Procedure Call Protocol
RPM Red Hat Package Manager
RSA Rivest–Shamir–Adleman
RTT Round-Trip Time
S3 Simple Storage Service
SAN Storage Area Network
SaaS Software as a Service
SAML Security Assertion Markup Language
SC Storage Controller
SDN Software-Defined Networks
SECaaS Security as a Service
SEaaS Sensor Event as a Service
SFI Software Fault Isolation
SIEM Security Information and Event Management
SLA Service-Level Agreements
SMC Secure Multi-Party Computation
SME Small Medium Enterprise
SMP Symmetric Multi-Processing
SOAP Simple Object Access Protocol
SOA Service-Oriented Architecture
SPT Shadow Page Table
SQL Structured Query Language
SSC SQL Server Compact
SSH Password-Based Auth
SSI Single System Image
STP Spanning Tree Protocol
TCSEC Trusted Computer System Evaluation Criteria
TDS Tabular Data Stream
TPA Third-Party Auditor
TPAS Third-Party Auditing Service
TPM Trusted Platform Module
TTP Trusted Third Party
TCG Trusted Computing Group
TCP/IP Transmission Control Protocol/Internet Protocol
UDB User Database
UFS User-Facing Service
VDCs Virtual Data Centers
VDI Virtual Desktop Infrastructure
VEE Virtual Environment Extension
VLAN Virtual Local Area Network
VLB Valiant Load Balancing
VM Virtual Machine
VMLM Virtual Machine Live Migration
VMM Virtual Machine Migration
VO Virtual Organization
VPC Virtual Predict Checkpointing
VPN Virtual Private Network
WaaS Workflow as a Service
WAN Wide Area Network
WSN Wireless Sensor Network
WWS Writable Working Set
WWW World Wide Web
XSS Cross-Site Scripting
XML Extensible Markup Language
YARN Yet Another Resource Negotiator
PART I Cloud Computing Architecture

1

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cloud Computing Solutions»

Представляем Вашему вниманию похожие книги на «Cloud Computing Solutions» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cloud Computing Solutions»

Обсуждение, отзывы о книге «Cloud Computing Solutions» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x