Resource Optimization and Security for Cloud Services

Nonfiction, Science & Nature, Technology, Telecommunications
Cover of the book Resource Optimization and Security for Cloud Services by Kaiqi Xiong, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Kaiqi Xiong ISBN: 9781118898567
Publisher: Wiley Publication: February 19, 2014
Imprint: Wiley-ISTE Language: English
Author: Kaiqi Xiong
ISBN: 9781118898567
Publisher: Wiley
Publication: February 19, 2014
Imprint: Wiley-ISTE
Language: English

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

More books from Wiley

Cover of the book Small Money Big Impact by Kaiqi Xiong
Cover of the book Revenue Generation Strategies: Leveraging Higher Education Resources for Increased Income by Kaiqi Xiong
Cover of the book Offshore Mechanics by Kaiqi Xiong
Cover of the book Fundraising When Money Is Tight by Kaiqi Xiong
Cover of the book Secrets of Online Entrepreneurs by Kaiqi Xiong
Cover of the book Public Health and Epidemiology at a Glance by Kaiqi Xiong
Cover of the book The Five Most Important Questions You Will Ever Ask About Your Organization by Kaiqi Xiong
Cover of the book Immunotherapy in Translational Cancer Research by Kaiqi Xiong
Cover of the book From Stuffed to Sorted by Kaiqi Xiong
Cover of the book The Mindful Workplace by Kaiqi Xiong
Cover of the book Heterogeneous Cellular Networks by Kaiqi Xiong
Cover of the book Subsurface Hydrology by Kaiqi Xiong
Cover of the book Network Function Virtualization by Kaiqi Xiong
Cover of the book An Introduction to the Early Development of Mathematics by Kaiqi Xiong
Cover of the book 74th Conference on Glass Problems by Kaiqi Xiong
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy