Cloud computing and virtualization /

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then t...

Full description

Saved in:
Bibliographic Details
Other Authors: Le, Dac-Nhuong, 1983- (Editor), Kumar, Raghvendra, 1987- (Editor), Nguyen, Nhu Gia (Editor), Chatterjee, Jyotir Moy (Editor)
Format: Electronic eBook
Language:English
Published: Hoboken, NJ : Beverly, MA : John Wiley & Sons ; Scrivener Publishing, 2018.
Subjects:
Online Access:CONNECT

MARC

LEADER 00000nam a2200000 i 4500
001 in00006301852
006 m o d
007 cr |||||||||||
008 180702s2018 nju ob 001 0 eng
005 20240124154823.4
010 |a  2018031768 
020 |a 9781119488149 
020 |a 9781119488088  |q (epub) 
020 |a 1119488087 
020 |a 9781119488125  |q (pdf) 
020 |a 1119488125 
020 |a 1119488141 
020 |a 1119487900 
020 |a 9781119487906 
020 |z 9781119487906  |q (cloth) 
035 |a (NhCcYBP)e80fa363d91f485b9a695405a0a7a4bb9781119488149 
035 |a 1wileyeba9781119488149 
037 |a 8D8110B2-146A-45F0-B45C-3E360F0DFF32  |b OverDrive, Inc.  |n http://www.overdrive.com 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d N$T  |d DG1  |d CNCGM  |d YDX  |d OCLCF  |d RECBK  |d MERER  |d UAB  |d UPM  |d TEFOD  |d COO  |d NLE  |d EBLCP  |d SNM  |d U3W  |d DLC 
042 |a pcc 
050 0 0 |a QA76.9.V5  |b C56 2018 
082 0 0 |a 004.67/82  |2 23 
245 0 0 |a Cloud computing and virtualization /  |c edited by Dac-Nhuong Le, Raghvendra Kumar, Gia Nhu Nguyen, Jyotir Moy Chatterjee. 
264 1 |a Hoboken, NJ :  |b John Wiley & Sons ;  |a Beverly, MA :  |b Scrivener Publishing,  |c 2018. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Wiley EBA  |5 TMurS 
588 0 |a Print version record and CIP data provided by publisherd. 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Title page; Copyright page; List of Figures; List of Tables; Preface; Acknowledgments; Acronyms; Introduction; Chapter 1: Live Virtual Concept in Cloud Environment; 1.1 Live Migration; 1.2 Issues with Migration; 1.3 Research on Live Migration; 1.4 Total Migration Time; 1.5 Graph Partitioning; 1.6 Conclusion; References; Chapter 2: Live Virtual Machine Migration in Cloud; 2.1 Introduction; 2.2 Business Challenge; 2.3 Virtual Machine Migration; 2.4 Virtualization System; 2.5 Live Virtual Machine Migration; 2.6 Conclusion; References. 
505 8 |a Chapter 3: Attacks and Policies in Cloud Computing and Live Migration3.1 Introduction to Cloud Computing; 3.2 Common Types of Attacks and Policies; 3.3 Conclusion; References; Chapter 4: Live Migration Security in Cloud; 4.1 Cloud Security and Security Appliances; 4.2 VMM in Clouds and Security Concerns; 4.3 Software-Defined Networking; 4.4 Distributed Messaging System; 4.5 Customized Testbed for Testing Migration Security in Cloud; 4.6 A Case Study and Other Use Cases; 4.7 Conclusion; References; Chapter 5: Solution for Secure Live Migration. 
505 8 |a 5.1 Detecting and Preventing Data Migrations to the Cloud5.2 Protecting Data Moving to the Cloud; 5.3 Application Security; 5.4 Virtualization; 5.5 Virtual Machine Guest Hardening; 5.6 Security as a Service; 5.7 Conclusion; References; Chapter 6: Dynamic Load Balancing Based on Live Migration; 6.1 Introduction; 6.2 Classification of Load Balancing Techniques; 6.3 Policy Engine; 6.4 Load Balancing Algorithm; 6.5 Resource Load Balancing; 6.6 Load Balancers in Virtual Infrastructure Management Software; 6.7 VMware Distributed Resource Scheduler; 6.8 Conclusion; References. 
505 8 |a Chapter 7: Live Migration in Cloud Data Center7.1 Definition of Data Center; 7.2 Data Center Traffic Characteristics; 7.3 Traffic Engineering for Data Centers; 7.4 Energy Efficiency in Cloud Data Centers; 7.5 Major Cause of Energy Waste; 7.6 Power Measurement and Modeling in Cloud; 7.7 Power Measurement Techniques; 7.8 Power Saving Policies in Cloud; 7.9 Conclusion; References; Chapter 8: Trusted VM-vTPM Live Migration Protocol in Clouds; 8.1 Trusted Computing; 8.2 TPM Operations; 8.3 TPM Applications and Extensions; 8.4 TPM Use Cases; 8.5 State of the Art in Public Cloud Computing Security. 
505 8 |a 8.6 Launch and Migration of Virtual Machines8.7 Trusted VM Launch and Migration Protocol; 8.8 Conclusion; References; Chapter 9: Lightweight Live Migration; 9.1 Introduction; 9.2 VM Checkpointing; 9.3 Enhanced VM Live Migration; 9.4 VM Checkpointing Mechanisms; 9.5 Lightweight Live Migration for Solo VM; 9.6 Lightweight Checkpointing; 9.7 Storage-Adaptive Live Migration; 9.8 Conclusion; References; Chapter 10: Virtual Machine Mobility with Self-Migration; 10.1 Checkpoints and Mobility; 10.2 Manual and Seamless Mobility; 10.3 Fine-and Coarse-Grained Mobility Models; 10.4 Migration Freeze Time. 
520 |a The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of the frameworks and prepares test-beds for testing and evaluating VM migration procedures as well as firewall rule migration. The book demonstrates how cloud computing can produce an effective way of network management, especially from a security perspective. 
650 0 |a Virtual computer systems  |x Security measures. 
650 0 |a Cloud computing. 
700 1 |a Le, Dac-Nhuong,  |d 1983-  |e editor. 
700 1 |a Kumar, Raghvendra,  |d 1987-  |e editor. 
700 1 |a Nguyen, Nhu Gia,  |e editor. 
700 1 |a Chatterjee, Jyotir Moy,  |e editor. 
730 0 |a WILEYEBA 
776 0 8 |i Print version:  |t Cloud computing and virtualization.  |d Hoboken, NJ : John Wiley & Sons ; Beverly, MA : Scrivener Publishing, 2018  |z 9781119487906  |w (DLC) 2018007565 
856 4 0 |u https://ezproxy.mtsu.edu/login?url=https://onlinelibrary.wiley.com/book/10.1002/9781119488149  |z CONNECT  |3 Wiley  |t 0 
949 |a ho0 
975 |p Wiley UBCM Online Book All Titles thru 2023 
976 |a 6006612 
998 |a wi  |d z 
999 f f |s 59599d19-be73-469e-8a84-19e819553df8  |i e0600ddd-c892-44fd-a169-c2085bc88989  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.9.V5 C56 2018  |h Library of Congress classification