List of Figures |
|
xvii | |
List of Tables |
|
xxiii | |
Preface |
|
xxv | |
About the Authors |
|
xxvii | |
Introduction |
|
xxix | |
Part I: Basic Concepts and Mechanisms of Mobile Cloud Computing |
|
|
Chapter 1 Overview of Cloud Computing |
|
|
3 | (16) |
|
|
5 | (1) |
|
1.2 Concept Of Cloud Computing |
|
|
5 | (1) |
|
1.3 Characteristics Of Cloud Computing |
|
|
6 | (1) |
|
1.4 Basic Cloud Computing Service Models |
|
|
7 | (7) |
|
1.4.1 Infrastructure-as-a-Service |
|
|
8 | (2) |
|
1.4.2 Platform-as-a-Service |
|
|
10 | (3) |
|
1.4.3 Software-as-a-Service |
|
|
13 | (1) |
|
1.5 Cloud Services Deployments |
|
|
14 | (2) |
|
1.5.1 Public Cloud Computing |
|
|
14 | (1) |
|
1.5.2 Private Cloud Computing |
|
|
15 | (1) |
|
1.5.3 Community Cloud Computing |
|
|
15 | (1) |
|
1.5.4 Hybrid Cloud Computing |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
Chapter 2 Specific Cloud Service Models |
|
|
19 | (24) |
|
|
20 | (1) |
|
|
21 | (3) |
|
|
21 | (1) |
|
2.2.2 Benefits And Drawbacks |
|
|
22 | (2) |
|
2.3 Database-As-A-Service |
|
|
24 | (2) |
|
|
24 | (1) |
|
2.3.2 Benefits And Drawbacks |
|
|
24 | (2) |
|
|
26 | (6) |
|
2.5 Information-As-A-Service |
|
|
28 | (1) |
|
2.6 Integration-As-A-Service |
|
|
29 | (3) |
|
2.7 Security-As-A-Service |
|
|
32 | (2) |
|
2.8 Management/governance-As-A-Service |
|
|
34 | (4) |
|
|
34 | (1) |
|
|
35 | (3) |
|
2.9 Other Specific Cloud Service Models |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
41 | (2) |
|
Chapter 3 Basic Mechanisms and Principles of Mobile Cloud Computing |
|
|
43 | (18) |
|
|
44 | (3) |
|
|
44 | (2) |
|
3.1.2 Fundamental Components |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (4) |
|
3.4 Main Techniques In Cloud Computing |
|
|
52 | (3) |
|
|
55 | (1) |
|
|
55 | (2) |
|
|
57 | (4) |
|
Chapter 4 MCC Architecture Design, Key Techniques, And Challenges |
|
|
61 | (20) |
|
|
62 | (1) |
|
4.2 Cloud Computing Architecture |
|
|
63 | (1) |
|
4.3 Architecture Of Mobile Cloud Computing |
|
|
64 | (3) |
|
|
64 | (1) |
|
4.3.2 Hybrid Cloud Computing Architecture |
|
|
65 | (2) |
|
4.4 Crucial Management Strategies For Distributed Clouds |
|
|
67 | (5) |
|
4.4.1 Hybrid Cloud Resource Manager |
|
|
69 | (2) |
|
4.4.2 Manipulations Of The Cloud Resource Manager |
|
|
71 | (1) |
|
4.5 Optimization Mechanisms Of Hybrid Cloud Computing |
|
|
72 | (1) |
|
4.6 Security Challenges And Solutions In Mobile Clouds |
|
|
73 | (3) |
|
4.6.1 Main Challenges In Mobile Clouds |
|
|
73 | (2) |
|
4.6.2 Overview Of Security Solutions |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (3) |
Part II: Optimizations Of Data Processing And Storage In Mobile Clouds |
|
|
Chapter 5 Basic Optimizations: A Perspective Of Cloud Computing Performance |
|
|
81 | (26) |
|
|
82 | (1) |
|
5.2 Cloud Computing Performance |
|
|
83 | (9) |
|
5.2.1 Two Technical Dimensions |
|
|
83 | (1) |
|
5.2.2 Basic Task Scheduling Method |
|
|
84 | (4) |
|
5.2.2.1 Use Directed Acyclic Graph |
|
|
86 | (1) |
|
5.2.2.2 Basic Cloud Performance Modelization Using The Dag |
|
|
87 | (1) |
|
5.2.3 Examples Of Evaluation Modelizations |
|
|
88 | (4) |
|
|
88 | (1) |
|
5.2.3.2 Calculations of Total Costs |
|
|
89 | (1) |
|
5.2.3.3 Case Study: Calculate Total Execution Time |
|
|
90 | (2) |
|
5.3 Green Cloud Computing |
|
|
92 | (10) |
|
5.3.1 Basic Concepts of Green Cloud Computing |
|
|
93 | (2) |
|
5.3.2 Dimensions in Algorithms of Green Clouds |
|
|
95 | (2) |
|
5.3.3 Creating an Algorithm for Green Clouds |
|
|
97 | (12) |
|
|
97 | (1) |
|
5.3.3.2 Sample Energy-Aware Scheduling Algorithm |
|
|
98 | (4) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (2) |
|
|
105 | (2) |
|
Chapter 6 Preemptable Algorithm Execution in Mobile Cloud Systems |
|
|
107 | (30) |
|
|
108 | (1) |
|
6.2 Preemptable Scheduling In IAAS |
|
|
109 | (12) |
|
6.2.1 Basic Cloud Resource Allocation Mechanism |
|
|
110 | (4) |
|
6.2.1.1 Fundamental Structure Of Cloud Resource Allocation Mechanism |
|
|
110 | (1) |
|
6.2.1.2 Main Steps Of Cloud Resource Allocation Mechanism |
|
|
111 | (3) |
|
6.2.2 Messaging Methods: Pull-Push Modes |
|
|
114 | (2) |
|
6.2.3 Concepts Of The Resource Allocation Model In Cloud Computing |
|
|
116 | (5) |
|
6.2.3.1 Advance Reservation vs. Best-Effort Tasks |
|
|
116 | (2) |
|
6.2.3.2 Formulations Of The Resource Allocation Problems |
|
|
118 | (2) |
|
6.2.3.3 Parameters/Variables Of The Execution Time |
|
|
120 | (1) |
|
|
121 | (1) |
|
6.3 Resource Allocation Algorithms In Cloud Computing |
|
|
121 | (10) |
|
6.3.1 Round-Robin (RR) Algorithm |
|
|
121 | (4) |
|
6.3.1.1 RR Algorithm Description |
|
|
121 | (2) |
|
6.3.1.2 RR Algorithm Example |
|
|
123 | (2) |
|
6.3.2 Cloud List Scheduling Algorithm |
|
|
125 | (2) |
|
6.3.2.1 Cloud List Scheduling Algorithm Description |
|
|
125 | (1) |
|
6.3.2.2 Cloud List Scheduling Algorithm Example |
|
|
126 | (1) |
|
6.3.3 Min-Mm Scheduling Algorithm |
|
|
127 | (12) |
|
6.3.3.1 Min-Min Scheduling Algorithm Description |
|
|
127 | (1) |
|
6.3.3.2 Min-Min Scheduling Algorithm Example |
|
|
128 | (3) |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
132 | (4) |
|
|
136 | (1) |
|
Chapter 7 Big Data and Service Computing in Cloud Computing |
|
|
137 | (14) |
|
|
138 | (1) |
|
|
139 | (2) |
|
7.2.1 Concepts Of Big Data |
|
|
139 | (1) |
|
7.2.2 Big Data Processing |
|
|
140 | (1) |
|
7.3 Phase-Reconfigurable Shuffle Optimization |
|
|
141 | (4) |
|
7.3.1 Spilling And Network In Shuffle |
|
|
141 | (11) |
|
7.3.1.1 Map Functions In Distributed System |
|
|
143 | (1) |
|
7.3.1.2 Networks In Shuffle |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (1) |
|
|
147 | (4) |
Part III: Security Issues and Solutions in Mobile Cloud Systems |
|
|
Chapter 8 Security and Privacy Issues and Threats in MCC |
|
|
151 | (28) |
|
|
152 | (3) |
|
|
153 | (1) |
|
8.1.2 Features of Security and Privacy Issues in Mobile Clouds |
|
|
154 | (1) |
|
8.2 Main Security And Privacy Problems |
|
|
155 | (5) |
|
8.2.1 Data Over-Collection Problems |
|
|
155 | (2) |
|
8.2.2 Data/Privacy Control Problems |
|
|
157 | (1) |
|
8.2.3 Trust Management Problems |
|
|
158 | (1) |
|
8.2.4 Multi-Tenancy Problems |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (4) |
|
8.3.1 Confidentiality, Integrity, and Availability |
|
|
161 | (1) |
|
8.3.2 Massive Data Mining |
|
|
162 | (1) |
|
|
162 | (1) |
|
8.3.4 Auditability, Forensics, and Legal Issues |
|
|
162 | (2) |
|
|
164 | (1) |
|
|
164 | (9) |
|
|
164 | (3) |
|
|
167 | (3) |
|
|
168 | (1) |
|
8.4.2.2 Service Provider Side |
|
|
169 | (1) |
|
|
170 | (11) |
|
8.4.3.1 Attack Methods and Goals |
|
|
170 | (1) |
|
8.4.3.2 Crucial Issues in Outsider Threats |
|
|
171 | (2) |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (4) |
|
Chapter 9 Privacy Protection Techniques in Mobile Cloud Computing |
|
|
179 | (24) |
|
|
180 | (1) |
|
9.2 Crucial Security Dimensions |
|
|
181 | (12) |
|
9.2.1 Infrastructure Security |
|
|
181 | (6) |
|
|
181 | (3) |
|
|
184 | (2) |
|
9.2.1.3 Application Layer |
|
|
186 | (1) |
|
9.2.2 Mobile Data Security and Storage |
|
|
187 | (2) |
|
9.2.3 Mobile Identity and Access Management |
|
|
189 | (1) |
|
9.2.4 Privacy Protection Concerns |
|
|
190 | (3) |
|
|
190 | (1) |
|
9.2.4.2 Concern Dimensions |
|
|
191 | (2) |
|
9.3 Security And Privacy Solutions |
|
|
193 | (4) |
|
|
193 | (1) |
|
9.3.2 Monitoring-Based Solutions |
|
|
194 | (1) |
|
9.3.3 Access Control-Based Solutions |
|
|
195 | (2) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (4) |
Part IV: Integrating Service-Oriented Architecture with Mobile Cloud Computing |
|
|
Chapter 10 Web Services in Cloud Computing |
|
|
203 | (24) |
|
|
204 | (1) |
|
10.2 Overview Of Service-Oriented Architecture |
|
|
205 | (12) |
|
|
205 | (2) |
|
|
205 | (1) |
|
10.2.1.2 Web Services Architecture |
|
|
205 | (2) |
|
10.2.2 Specifications of Web Services |
|
|
207 | (6) |
|
10.2.2.1 Simple Object Access Protocol |
|
|
207 | (3) |
|
10.2.2.2 Representational State Transfer |
|
|
210 | (2) |
|
10.2.2.3 JavaScript Object Notation |
|
|
212 | (1) |
|
|
212 | (1) |
|
10.2.3 Service-Oriented Architecture |
|
|
213 | (4) |
|
10.2.3.1 Basic Concepts of SOA |
|
|
213 | (1) |
|
10.2.3.2 Understanding Services |
|
|
213 | (4) |
|
10.3 Integrating Service-Oriented Architecture With Cloud Computing |
|
|
217 | (5) |
|
10.3.1 Integration Fundamentals |
|
|
217 | (2) |
|
10.3.2 Web Services Business Process Execution Language |
|
|
219 | (1) |
|
10.3.3 Web Services Security and Specifications |
|
|
219 | (8) |
|
|
219 | (1) |
|
10.3.3.2 WS-Security Framework |
|
|
220 | (2) |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (4) |
Part V: Appendices |
|
|
Appendix A: Sample of A Course Project |
|
|
227 | (14) |
|
|
227 | (1) |
|
A.2 Part I: Hands-On Experience |
|
|
227 | (2) |
|
A.2.1 Experimental Requirement |
|
|
228 | (1) |
|
A.2.2 Dag And Execution Time Table |
|
|
228 | (1) |
|
A.3 Part Ii: Research Essay |
|
|
229 | (2) |
|
A.4 Tutorial: Create/Launch Virtual Machine For Part I |
|
|
231 | (10) |
|
Appendix B: Sample Of Exam Sheet |
|
|
241 | (8) |
|
B.1 Part I. Multiple Choice Questions |
|
|
241 | (4) |
|
B.2 Part II. Short Answer Question |
|
|
245 | (2) |
|
|
247 | (2) |
|
Appendix C: Simulator Tool Sample Codes |
|
|
249 | (16) |
|
C.1 Program 1: User Interface (UI.Java) |
|
|
250 | (5) |
|
|
255 | (2) |
|
C.3 Program 3: Taskgraph.Java |
|
|
257 | (8) |
References |
|
265 | (12) |
Index |
|
277 | |