Atnaujinkite slapukų nuostatas

Mobile Cloud Computing: Models, Implementation, and Security [Kietas viršelis]

(Pace University, New York City, New York, USA), (Pace University, New York City, New York, USA)
  • Formatas: Hardback, 288 pages, aukštis x plotis: 234x156 mm, weight: 566 g, 50 Illustrations, black and white
  • Išleidimo metai: 08-May-2017
  • Leidėjas: Chapman & Hall/CRC
  • ISBN-10: 1498796036
  • ISBN-13: 9781498796033
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 288 pages, aukštis x plotis: 234x156 mm, weight: 566 g, 50 Illustrations, black and white
  • Išleidimo metai: 08-May-2017
  • Leidėjas: Chapman & Hall/CRC
  • ISBN-10: 1498796036
  • ISBN-13: 9781498796033
Kitos knygos pagal šią temą:

Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.

The book begins with an overview of mobile cloud computing concepts, models, and service deployments, as well as specific cloud service models. It continues with the basic mechanisms and principles of mobile computing, as well as virtualization techniques. The book also introduces mobile cloud computing architecture, design, key techniques, and challenges.

The second part of the book covers optimizations of data processing and storage in mobile clouds, including performance and green clouds. The crucial optimization algorithm in mobile cloud computing is also explored, along with big data and service computing.

Security issues in mobile cloud computing are covered in-depth, including a brief introduction to security and privacy issues and threats, as well as privacy protection techniques in mobile systems. The last part of the book features the integration of service-oriented architecture with mobile cloud computing. It discusses web service specifications related to implementations of mobile cloud computing.

The book not only presents critical concepts in mobile cloud systems, but also drives readers to deeper research, through open discussion questions. Practical case studies are also included. Suitable for graduate students and professionals, this book provides a detailed and timely overview of mobile cloud computing for a broad range of readers.

List of Figures xvii
List of Tables xxiii
Preface xxv
About the Authors xxvii
Introduction xxix
Part I: Basic Concepts and Mechanisms of Mobile Cloud Computing
Chapter 1 Overview of Cloud Computing
3(16)
1.1 Introduction
5(1)
1.2 Concept Of Cloud Computing
5(1)
1.3 Characteristics Of Cloud Computing
6(1)
1.4 Basic Cloud Computing Service Models
7(7)
1.4.1 Infrastructure-as-a-Service
8(2)
1.4.2 Platform-as-a-Service
10(3)
1.4.3 Software-as-a-Service
13(1)
1.5 Cloud Services Deployments
14(2)
1.5.1 Public Cloud Computing
14(1)
1.5.2 Private Cloud Computing
15(1)
1.5.3 Community Cloud Computing
15(1)
1.5.4 Hybrid Cloud Computing
15(1)
1.6 Summary
16(1)
1.7 Exercises
16(1)
1.8 Glossary
17(2)
Chapter 2 Specific Cloud Service Models
19(24)
2.1 Desktop-As-A-Service
20(1)
2.2 Storage-As-A-Service
21(3)
2.2.1 Main Concepts
21(1)
2.2.2 Benefits And Drawbacks
22(2)
2.3 Database-As-A-Service
24(2)
2.3.1 Main Concepts
24(1)
2.3.2 Benefits And Drawbacks
24(2)
2.4 Backend-As-A-Service
26(6)
2.5 Information-As-A-Service
28(1)
2.6 Integration-As-A-Service
29(3)
2.7 Security-As-A-Service
32(2)
2.8 Management/governance-As-A-Service
34(4)
2.8.1 Main Concepts
34(1)
2.8.2 Mechanism
35(3)
2.9 Other Specific Cloud Service Models
38(1)
2.10 Summary
38(1)
2.11 Exercises
39(2)
2.12 Glossary
41(2)
Chapter 3 Basic Mechanisms and Principles of Mobile Cloud Computing
43(18)
3.1 Introduction
44(3)
3.1.1 Concepts
44(2)
3.1.2 Fundamental Components
46(1)
3.2 Mobile Computing
47(1)
3.3 Wireless Networks
48(4)
3.4 Main Techniques In Cloud Computing
52(3)
3.5 Summary
55(1)
3.6 Exercises
55(2)
3.7 Glossary
57(4)
Chapter 4 MCC Architecture Design, Key Techniques, And Challenges
61(20)
4.1 Introduction
62(1)
4.2 Cloud Computing Architecture
63(1)
4.3 Architecture Of Mobile Cloud Computing
64(3)
4.3.1 Overview
64(1)
4.3.2 Hybrid Cloud Computing Architecture
65(2)
4.4 Crucial Management Strategies For Distributed Clouds
67(5)
4.4.1 Hybrid Cloud Resource Manager
69(2)
4.4.2 Manipulations Of The Cloud Resource Manager
71(1)
4.5 Optimization Mechanisms Of Hybrid Cloud Computing
72(1)
4.6 Security Challenges And Solutions In Mobile Clouds
73(3)
4.6.1 Main Challenges In Mobile Clouds
73(2)
4.6.2 Overview Of Security Solutions
75(1)
4.7 Summary
76(1)
4.8 Exercises
77(1)
4.9 Glossary
78(3)
Part II: Optimizations Of Data Processing And Storage In Mobile Clouds
Chapter 5 Basic Optimizations: A Perspective Of Cloud Computing Performance
81(26)
5.1 Introduction
82(1)
5.2 Cloud Computing Performance
83(9)
5.2.1 Two Technical Dimensions
83(1)
5.2.2 Basic Task Scheduling Method
84(4)
5.2.2.1 Use Directed Acyclic Graph
86(1)
5.2.2.2 Basic Cloud Performance Modelization Using The Dag
87(1)
5.2.3 Examples Of Evaluation Modelizations
88(4)
5.2.3.1 Mapping Costs
88(1)
5.2.3.2 Calculations of Total Costs
89(1)
5.2.3.3 Case Study: Calculate Total Execution Time
90(2)
5.3 Green Cloud Computing
92(10)
5.3.1 Basic Concepts of Green Cloud Computing
93(2)
5.3.2 Dimensions in Algorithms of Green Clouds
95(2)
5.3.3 Creating an Algorithm for Green Clouds
97(12)
5.3.3.1 Crucial Steps
97(1)
5.3.3.2 Sample Energy-Aware Scheduling Algorithm
98(4)
5.4 Further Reading
102(1)
5.5 Summary
102(1)
5.6 Exercises
103(2)
5.7 Glossary
105(2)
Chapter 6 Preemptable Algorithm Execution in Mobile Cloud Systems
107(30)
6.1 Introduction
108(1)
6.2 Preemptable Scheduling In IAAS
109(12)
6.2.1 Basic Cloud Resource Allocation Mechanism
110(4)
6.2.1.1 Fundamental Structure Of Cloud Resource Allocation Mechanism
110(1)
6.2.1.2 Main Steps Of Cloud Resource Allocation Mechanism
111(3)
6.2.2 Messaging Methods: Pull-Push Modes
114(2)
6.2.3 Concepts Of The Resource Allocation Model In Cloud Computing
116(5)
6.2.3.1 Advance Reservation vs. Best-Effort Tasks
116(2)
6.2.3.2 Formulations Of The Resource Allocation Problems
118(2)
6.2.3.3 Parameters/Variables Of The Execution Time
120(1)
6.2.4 Summary
121(1)
6.3 Resource Allocation Algorithms In Cloud Computing
121(10)
6.3.1 Round-Robin (RR) Algorithm
121(4)
6.3.1.1 RR Algorithm Description
121(2)
6.3.1.2 RR Algorithm Example
123(2)
6.3.2 Cloud List Scheduling Algorithm
125(2)
6.3.2.1 Cloud List Scheduling Algorithm Description
125(1)
6.3.2.2 Cloud List Scheduling Algorithm Example
126(1)
6.3.3 Min-Mm Scheduling Algorithm
127(12)
6.3.3.1 Min-Min Scheduling Algorithm Description
127(1)
6.3.3.2 Min-Min Scheduling Algorithm Example
128(3)
6.4 Further Reading
131(1)
6.5 Summary
132(1)
6.6 Exercises
132(4)
6.7 Glossary
136(1)
Chapter 7 Big Data and Service Computing in Cloud Computing
137(14)
7.1 Introduction
138(1)
7.2 Overview Of Big Data
139(2)
7.2.1 Concepts Of Big Data
139(1)
7.2.2 Big Data Processing
140(1)
7.3 Phase-Reconfigurable Shuffle Optimization
141(4)
7.3.1 Spilling And Network In Shuffle
141(11)
7.3.1.1 Map Functions In Distributed System
143(1)
7.3.1.2 Networks In Shuffle
144(1)
7.3.1.3 Reduce Side
144(1)
7.4 Further Reading
145(1)
7.5 Summary
146(1)
7.6 Exercises
146(1)
7.7 Glossary
147(4)
Part III: Security Issues and Solutions in Mobile Cloud Systems
Chapter 8 Security and Privacy Issues and Threats in MCC
151(28)
8.1 Introduction
152(3)
8.1.1 Basic Concepts
153(1)
8.1.2 Features of Security and Privacy Issues in Mobile Clouds
154(1)
8.2 Main Security And Privacy Problems
155(5)
8.2.1 Data Over-Collection Problems
155(2)
8.2.2 Data/Privacy Control Problems
157(1)
8.2.3 Trust Management Problems
158(1)
8.2.4 Multi-Tenancy Problems
159(1)
8.2.5 Summary
160(1)
8.3 Threat Taxonomy
160(4)
8.3.1 Confidentiality, Integrity, and Availability
161(1)
8.3.2 Massive Data Mining
162(1)
8.3.3 Attack Interfaces
162(1)
8.3.4 Auditability, Forensics, and Legal Issues
162(2)
8.3.5 Summary
164(1)
8.4 Threat Models
164(9)
8.4.1 Basic Concepts
164(3)
8.4.2 Insider Threats
167(3)
8.4.2.1 Customer Side
168(1)
8.4.2.2 Service Provider Side
169(1)
8.4.3 Outsider Threats
170(11)
8.4.3.1 Attack Methods and Goals
170(1)
8.4.3.2 Crucial Issues in Outsider Threats
171(2)
8.5 Further Reading
173(1)
8.6 Summary
174(1)
8.7 Exercises
174(1)
8.8 Glossary
175(4)
Chapter 9 Privacy Protection Techniques in Mobile Cloud Computing
179(24)
9.1 Introduction
180(1)
9.2 Crucial Security Dimensions
181(12)
9.2.1 Infrastructure Security
181(6)
9.2.1.1 Network Layer
181(3)
9.2.1.2 Host Layer
184(2)
9.2.1.3 Application Layer
186(1)
9.2.2 Mobile Data Security and Storage
187(2)
9.2.3 Mobile Identity and Access Management
189(1)
9.2.4 Privacy Protection Concerns
190(3)
9.2.4.1 Data Life Cycle
190(1)
9.2.4.2 Concern Dimensions
191(2)
9.3 Security And Privacy Solutions
193(4)
9.3.1 Overview
193(1)
9.3.2 Monitoring-Based Solutions
194(1)
9.3.3 Access Control-Based Solutions
195(2)
9.4 Further Reading
197(1)
9.5 Summary
198(1)
9.6 Exercises
198(1)
9.7 Glossary
199(4)
Part IV: Integrating Service-Oriented Architecture with Mobile Cloud Computing
Chapter 10 Web Services in Cloud Computing
203(24)
10.1 Introduction
204(1)
10.2 Overview Of Service-Oriented Architecture
205(12)
10.2.1 Web Services
205(2)
10.2.1.1 Basic Concepts
205(1)
10.2.1.2 Web Services Architecture
205(2)
10.2.2 Specifications of Web Services
207(6)
10.2.2.1 Simple Object Access Protocol
207(3)
10.2.2.2 Representational State Transfer
210(2)
10.2.2.3 JavaScript Object Notation
212(1)
10.2.2.4 WS-Coordination
212(1)
10.2.3 Service-Oriented Architecture
213(4)
10.2.3.1 Basic Concepts of SOA
213(1)
10.2.3.2 Understanding Services
213(4)
10.3 Integrating Service-Oriented Architecture With Cloud Computing
217(5)
10.3.1 Integration Fundamentals
217(2)
10.3.2 Web Services Business Process Execution Language
219(1)
10.3.3 Web Services Security and Specifications
219(8)
10.3.3.1 Specifications
219(1)
10.3.3.2 WS-Security Framework
220(2)
10.4 Summary
222(1)
10.5 Exercises
222(1)
10.6 Glossary
223(4)
Part V: Appendices
Appendix A: Sample of A Course Project
227(14)
A.1 Project Description
227(1)
A.2 Part I: Hands-On Experience
227(2)
A.2.1 Experimental Requirement
228(1)
A.2.2 Dag And Execution Time Table
228(1)
A.3 Part Ii: Research Essay
229(2)
A.4 Tutorial: Create/Launch Virtual Machine For Part I
231(10)
Appendix B: Sample Of Exam Sheet
241(8)
B.1 Part I. Multiple Choice Questions
241(4)
B.2 Part II. Short Answer Question
245(2)
B.3 Answers For Part I
247(2)
Appendix C: Simulator Tool Sample Codes
249(16)
C.1 Program 1: User Interface (UI.Java)
250(5)
C.2 Program 2: Task.Java
255(2)
C.3 Program 3: Taskgraph.Java
257(8)
References 265(12)
Index 277
Meikang Qiu is an associate professor of computer science at Pace University, and an adjunct professor at Columbia University. He is an IEEE/ACM Senior Member, as well as Chair of the IEEE STC (Special Technical Community) on Smart Computing. He is an associate editor of a dozen of journals including IEEE Transactions on Computers and IEEE Transactions on Cloud Computing. He has published 320+ peer-reviewed journal/conference papers and won 10+ Best Paper Awards.

Keke Gai is pursuing his PhD at Pace University. He has published over 70 peer-reviewed journal or conference papers, and has been granted three IEEE Best Paper Awards and two IEEE Best Student Paper Awards. His research interests include cloud computing, cyber security, combinatorial optimization, business process modeling, enterprise architecture, and Internet computing.