Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Research advances in cloud computing
Chaudhary S., Somani G., Buyya R., Springer International Publishing, New York, NY, 2017. 465 pp. Type: Book
Date Reviewed: Aug 8 2019

This book includes recent research trends in cloud computing. It covers a wide range of research topics, some of which will be of interest to cloud users and others to cloud vendors. This review organizes 18 chapters into topics for cloud users, cloud platform providers, cloud vendors, and cloud researchers.

Chapter 4 is recommended to beginners, because it provides organized terminologies of cloud artifacts supporting nonfunctional requirements. This chapter organizes cloud computing terms into seven components, that is, mechanism, technique, and so on. It is also useful to cloud researchers because artifact classification enables the visualization of new challenges that can be explored in future research.

Chapters 1, 3, 5, and 15 are useful to cloud users. Chapter 1 introduces serverless computing. Cloud application developers use function as a service (FaaS) to implement their business logic without concerning complicated server maintenance. Each request in a program needs to carry the state or context together due to the stateless feature of serverless computing. From a cost perspective, it is beneficial to bursty programs since the cost is metered by system usage time. Chapter 3 introduces online data analytics for big data. Traditional regression analysis and singular value decomposition (SVD) algorithms are reformed for online analysis. This chapter also presents cloud architectures for computing SVD and principle component analysis (PCA) online. In many industries, a hybrid cloud approach is an attractive solution because it can provide both private and public cloud advantages. A main challenge in this approach is how to securely connect computing resources in separate clouds. Chapter 5 introduces virtual private networks (VPNs), focusing on Microsoft Azure VPN configuration to solve the above problem. Like any computing infrastructure, cloud computing is also subject to cyberattacks. Chapter 15 identifies evidence from three different sources and proposes a framework for cloud forensic analysis.

Chapters 16 and 17 will interest secure cloud platform service providers. As the number of cloud services increases, enabling available services to be “carefully authorized to control which ... application can utilize which service at which time” becomes a security issue. Chapter 16 proposes an access control framework for secure and interoperable cloud computing (FSICC). The proposed FSICC “organizes and globally manages the local cloud services ... into a set of global services so that applications can easily discover and utilize them [with a common interface].” Chapter 16 demonstrates the usage of the proposed framework with the Connecticut Concussion Tracker (CT2) mHealth application. Chapter 17 also handles security issues in healthcare information, as it surveys several security and privacy mechanisms that prevent attackers from distinguishing an individual’s health information.

Chapters 7 to 14 and 18 will interest cloud vendors. Readers who are interested in resource management can start with chapter 9, which summarizes overall resource management. Resource scheduling and allocation are covered in chapters 10 and 11. Chapter 8 proposes a mechanism that learns the application’s resource requirements and selects a virtual machine (VM) type for a new application server request. This mechanism can decrease the cost of cloud services. Chapter 12 focuses on VM placement optimization and chapter 13 introduces VM migration. Chapter 18 introduces VM trusted computing (TC), for example, the integrity of the started VM and VM migration between trusted nodes. While current cloud services are offered with fixed pricing, dynamic pricing can be considered for better matching between service requirements and service supply. Chapter 7 focuses on three cloud management issues: resource procurement, resource allocation, and power-aware metering; resource procurement selects a cloud vendor that provides the best service with the best price; resource allocation selects a host coalition that meets the requested resources; and power-aware metering is a mechanism for a power consumption and economic model with a smart grid. Chapter 14 introduces container platforms and several security issues. While traditional hypervisor platforms provide multiple guest operating systems (OSs), container platforms share the kernel of an OS and provide multiple containers that isolate the system environment for each user. Since multiple containers share the kernel, the kernel management burden can be decreased to an almost negligible degree and the efficiency of the system can be increased dramatically. Furthermore, this chapter analyzes Common Vulnerabilities and Exposures (CVE) reports, published by MITRE, through security requirements such as isolation of processes, filesystem isolation, and so on.

Chapter 2 introduces a review of the literature on cloud models to achieve high availability, including the reliability block diagram (RBD) model, the stochastic colored Petri nets (SCPN) model, and so on. Combining multiple models is recommended in order to have “comprehensive models and frameworks addressing all aspects of high availability.” Chapter 6 introduces input/output (I/O) virtualization (IOV) techniques and proposes an enhanced message passing interface (MPI) library design over single-root I/O virtualization (SR-IOV) enabled InfiniBand clusters. Virtualization is applied to I/O to solve the latency in the peripheral component interconnect (PCI) bus. The experimental results show that the proposed solution can achieve a magnitude of performance improvement when compared to Amazon Elastic Compute Cloud (EC2).

Reviewer:  Seon Yeong Han Review #: CR146647 (1910-0353)
Bookmark and Share
 
Cloud Computing (C.2.4 ... )
 
 
Distributed Architectures (C.1.4 ... )
 
 
Network Architecture And Design (C.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Cloud Computing": Date
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (1 of 3)
Dec 14 2009
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (2 of 3)
Jan 26 2010
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (3 of 3)
Mar 18 2010
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy