新书报道
当前位置: 首页 >> 电类优秀教材 >> 正文
Resource Optimization and Security for Cloud Services
发布日期:2015-09-17  浏览

Resource Optimization and Security for Cloud Services

[Book Description]

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

[Table of Contents]
 
Preface                                            ix
Chapter 1 Introduction 1 (12)
1.1 Motivation 1 (3)
1.2 The problems 4 (5)
1.3 Summary of contributions 9 (2)
1.4 The organization of this book 11 (2)
Chapter 2 Current Approaches for Resource 13 (14)
Optimization and Security
2.1 Service availability 14 (2)
2.2 Trustworthiness 16 (2)
2.3 Performance 18 (2)
2.4 The resource optimization problem 20 (2)
subject to an SLA
2.5 Public-key cryptography-based 22 (5)
authentication
Chapter 3 Single Class Customers 27 (42)
3.1 The percentile of response time 28 (1)
3.2 A resource optimization problem for 29 (2)
service models with single-class customers
3.3 Approaches for the resource 31 (7)
optimization
3.4 Numerical validations 38 (5)
3.5 The balanced condition 43 (6)
3.6 Services Performance Modeling and 49 (17)
Analysis in a Simple Scenario of Cloud
Computing
3.6.1 Overview 50 (4)
3.6.2 A computer service performance 54 (8)
model
3.6.3 A numerical validation 62 (3)
3.6.4 Discussions 65 (1)
3.7 Concluding remarks 66 (3)
Chapter 4 Multiple-Class Customers 69 (26)
4.1 The SLA performance metric in the 70 (1)
case of multiple class customers
4.2 The resource optimization problem for 71 (1)
multiple customer services
4.2.1 Resource optimization problem for 72 (1)
multiple class customers
4.3 Approaches for resource optimization 72 (14)
4.3.1 The LSTs of response time 72 (5)
distributions for two priority customers
4.3.2 Algorithms for the resource 77 (9)
optimization problem
4.4 Numerical validations 86 (7)
4.5 Concluding remarks 93 (2)
Chapter 5 A Trustworthy Service Model 95 (46)
5.1 The trust-based resource optimization 96 (3)
problem
5.2 A framework for solving the 99 (5)
trust-based resource provisioning problem
5.3 The calculation of SLA metrics 104(7)
5.3.1 The trustworthiness of resource 104(4)
sites
5.3.2 The percentile response time 108(2)
5.3.3 The service availability 110(1)
5.4 An approach for solving the 111(19)
trust-based resource provisioning problem
5.4.1 Single-class customers 112(8)
5.4.2 Multiple priority customers 120(10)
5.5 Numerical examples 130(8)
5.5.1 Single-class customers 130(4)
5.5.2 Multiple priority customers 134(4)
5.6 Concluding remarks 138(3)
Chapter 6 Performance Analysis of 141(32)
Public-Key Cryptography-Based Group
Authentication
6.1 Public-key cryptography-based 142(2)
authentication
6.2 PKCROSS and PKTAPP 144(12)
6.2.1 Protocol analysis 145(5)
6.2.2 The calculation of the response 150(6)
time via queuing networks
6.3 A new group authentication technique 156(7)
using public-key cryptography
6.3.1 A single remote realm 156(5)
6.3.2 Multiple remote realms 161(2)
6.4 Performance evaluation of the new 163(8)
proposed technique
6.4.1 The operations of encryption and 163(4)
decryption
6.4.2 The calculation of the response 167(3)
time via a queuing network
6.4.3 Discussions 170(1)
6.5 Concluding remarks 171(2)
Chapter 7 Summary and Future Work 173(8)
7.1 Research summary of the book 173(3)
7.2 Future research directions 176(5)
Bibliography 181(12)
Index 193

关闭


版权所有:西安交通大学图书馆      设计与制作:西安交通大学数据与信息中心  
地址:陕西省西安市碑林区咸宁西路28号     邮编710049

推荐使用IE9以上浏览器、谷歌、搜狗、360浏览器;推荐分辨率1360*768以上