Mahmood / Hill | Cloud Computing for Enterprise Architectures | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 330 Seiten

Reihe: Computer Communications and Networks

Mahmood / Hill Cloud Computing for Enterprise Architectures


1. Auflage 2011
ISBN: 978-1-4471-2236-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 330 Seiten

Reihe: Computer Communications and Networks

ISBN: 978-1-4471-2236-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.

Mahmood / Hill Cloud Computing for Enterprise Architectures jetzt bestellen!

Weitere Infos & Material


1;Cloud Computing for Enterprise Architectures;3
1.1;Foreword;7
1.2;Preface;9
1.2.1;Overview and Goals;9
1.2.2;Organization and Features;9
1.2.3;Target Audiences;10
1.2.4;Suggested Uses;10
1.2.5;Acknowledgements;11
1.3;Contents;13
1.4;Contributors;15
1.5;Part I: Concepts and Principles;19
1.5.1;Chapter 1: Cloud Computing for Enterprise Architectures: Concepts, Principles and Approaches;20
1.5.1.1;1.1 Introduction;20
1.5.1.2;1.2 Cloud Computing;22
1.5.1.2.1;1.2.1 Characteristics, Promise and Benefits;22
1.5.1.2.2;1.2.2 Deployment Approaches;23
1.5.1.2.2.1;1.2.2.1 Software as a Service (SaaS);24
1.5.1.2.2.2;1.2.2.2 Platform as a Service (PaaS);25
1.5.1.2.2.3;1.2.2.3 Infrastructure as a Service (IaaS);26
1.5.1.2.2.4;1.2.2.4 Extended Frameworks;26
1.5.1.2.3;1.2.3 Issues and Challenges;27
1.5.1.2.4;1.2.4 Cloud Technologies;27
1.5.1.3;1.3 Enterprise Architectures;29
1.5.1.3.1;1.3.1 Enterprise Architecture Frameworks;29
1.5.1.4;1.4 Cloud Computing and Enterprise Architectures;30
1.5.1.4.1;1.4.1 The Way Forward;32
1.5.1.5;1.5 Conclusion;34
1.5.1.6;References;34
1.5.2;Chapter 2: Enterprise Architecture Fundamentals;37
1.5.2.1;2.1 Introduction;37
1.5.2.2;2.2 Aligning Business and Technological Needs;38
1.5.2.3;2.3 Towards a Framework for EA;39
1.5.2.4;2.4 Service-Oriented Architecture;40
1.5.2.5;2.5 Some Definitions;41
1.5.2.5.1;2.5.1 What Is an Architecture?;41
1.5.2.5.2;2.5.2 What Is an Enterprise?;42
1.5.2.5.3;2.5.3 Enterprise Architecture;42
1.5.2.6;2.6 Towards an EA Typology;44
1.5.2.6.1;2.6.1 IT-Centric EA;44
1.5.2.6.2;2.6.2 Business Process-Centric Enterprise Architecture;46
1.5.2.6.3;2.6.3 Governance-Centric Enterprise Architecture;47
1.5.2.7;2.7 Assessing the Benefits of Enterprise Architecture;47
1.5.2.7.1;2.7.1 EA Contributions for the Business;48
1.5.2.7.2;2.7.2 EA Contributions for IT Infrastructure;52
1.5.2.8;2.8 Discussion;55
1.5.2.8.1;2.8.1 EA Contributions to SOA;55
1.5.2.8.2;2.8.2 SOA Contributions to EA;56
1.5.2.9;2.9 Conclusion;56
1.5.2.10;References;56
1.5.3;Chapter 3: Cloud Computing Business Models;58
1.5.3.1;3.1 Introduction;58
1.5.3.2;3.2 Business Models and the Cloud Layers;59
1.5.3.3;3.3 Cloud Computing Layers;60
1.5.3.4;3.4 Business Models of the Cloud;62
1.5.3.5;3.5 Infrastructure as a Service (IaaS);63
1.5.3.6;3.6 IaaS Variants;65
1.5.3.7;3.7 Platform as a Service (PaaS);67
1.5.3.8;3.8 Software as a Service (SaaS);68
1.5.3.9;3.9 The Cloud and the Evolving Relationships;71
1.5.3.10;3.10 Conclusion;73
1.5.3.11;References;74
1.5.4;Chapter 4: The Convergence of Enterprise Architecture (EA) and Cloud Computing;76
1.5.4.1;4.1 Introduction;77
1.5.4.2;4.2 Next Generation Enterprises: The IT Requirements;77
1.5.4.2.1;4.2.1 Next-Generation Service Delivery Networks;79
1.5.4.3;4.3 Elucidating the Evolving Cloud Idea;80
1.5.4.3.1;4.3.1 The Cloud Realization Technologies;82
1.5.4.3.2;4.3.2 The Cloud-Induced Innovations on Enterprise Architecture;83
1.5.4.3.3;4.3.3 Why Cloud Enablement?;84
1.5.4.3.4;4.3.4 Implementing Smarter Environments via Clouds;85
1.5.4.3.5;4.3.5 Application Domains;85
1.5.4.4;4.4 Enterprise Architecture and Cloud Computing;86
1.5.4.4.1;4.4.1 Briefing Enterprise Architecture (EA);86
1.5.4.4.2;4.4.2 The Cloud Implications;88
1.5.4.4.3;4.4.3 Cloud Processes;89
1.5.4.4.4;4.4.4 Event-Driven Business Processes;90
1.5.4.4.5;4.4.5 Communication-Enabled Business Processes (CEBP);90
1.5.4.4.6;4.4.6 Cloud-Impacted Business Processes;91
1.5.4.5;4.5 A Strategy for Establishing Enterprise Private Clouds;91
1.5.4.5.1;4.5.1 Why Private Clouds?;93
1.5.4.6;4.6 Cloud-Enabled Enterprise Communications;94
1.5.4.6.1;4.6.1 Virtualization for the Communication Industry;95
1.5.4.6.2;4.6.2 Cloud Inspires the UC Paradigm;96
1.5.4.6.3;4.6.3 Communication as a Service (CaaS);96
1.5.4.7;4.7 Cloud-Enablement Strategy;97
1.5.4.7.1;4.7.1 Cloud-Enabled Enterprise: The Transition Methodology;97
1.5.4.7.1.1;4.7.1.1 Service Categorization;97
1.5.4.7.1.2;4.7.1.2 Service Selection;98
1.5.4.7.1.3;4.7.1.3 Service Selection Attributes for Cloud-Based Delivery;98
1.5.4.7.1.4;4.7.1.4 Right Services for Clouds: The Selection Approach;98
1.5.4.7.2;4.7.2 Cloud Participation;99
1.5.4.7.3;4.7.3 Contract in the Cloud;99
1.5.4.7.3.1;4.7.3.1 Cloud Contract Characteristics;100
1.5.4.7.3.2;4.7.3.2 Leveraging EA Frameworks for Cloud Strategy;100
1.5.4.7.3.3;4.7.3.3 Role of EA in Defining the Contracts with CSPs and CSBs;101
1.5.4.8;4.8 Conclusion;101
1.5.4.9;References;102
1.6;Part II: Approaches and Frameworks;103
1.6.1;Chapter 5: Component-Based Development for Cloud Computing Architectures;104
1.6.1.1;5.1 Introduction;104
1.6.1.2;5.2 Background and Characteristics of Cloud Computing;106
1.6.1.3;5.3 Cloud Services;109
1.6.1.4;5.4 Service-Oriented Component Architectures;110
1.6.1.5;5.5 Characteristics of Service-Oriented Systems for the Cloud;111
1.6.1.6;5.6 Development Process Model for Cloud Applications;112
1.6.1.7;5.7 Best Practice Software Design Guidelines;114
1.6.1.8;5.8 Component Model for Cloud Applications and Services;116
1.6.1.8.1;5.8.1 Component Model and Design Guidelines for Security in Cloud Computing;117
1.6.1.8.2;5.8.2 Component Model and Design Guidelines for Software as a Service (SaaS);118
1.6.1.8.3;5.8.3 Component Model and Design Guidelines for Platform as a Service (PaaS);120
1.6.1.8.4;5.8.4 Component Model and Design Guidelines for Infrastructure as a Service (IaaS);121
1.6.1.8.5;5.8.5 Component Composition for Amazon Cloud Architecture;123
1.6.1.9;5.9 Conclusion;126
1.6.1.10;References;126
1.6.2;Chapter 6: Identity and Access Management in Cloud Computing;128
1.6.2.1;6.1 Introduction;129
1.6.2.2;6.2 Cloud Computing Market;129
1.6.2.3;6.3 Related Work;130
1.6.2.4;6.4 Proposed Identity and Access Management (IAM) Model;134
1.6.2.4.1;6.4.1 Analysis and Design;134
1.6.2.4.1.1;6.4.1.1 Access Control E nforcement Unit (ACEU);134
1.6.2.4.1.2;6.4.1.2 Access Contro l Decision Unit (ACDU);135
1.6.2.4.1.3;6.4.1.3 User Registration;136
1.6.2.4.1.4;6.4.1.4 User Login;137
1.6.2.4.1.5;6.4.1.5 Kerberos Authentication;138
1.6.2.4.1.6;6.4.1.6 Access Granting;139
1.6.2.4.2;6.4.2 Defining Policies in XML;139
1.6.2.4.2.1;6.4.2.1 XML Permission Sheet;139
1.6.2.4.2.2;6.4.2.2 XML Credential Type Definition (XCredTypeDef);141
1.6.2.4.2.3;6.4.2.3 XML Role Sheet (XRS);141
1.6.2.4.2.4;6.4.2.4 XML Permission Role Assignment (XPRA);141
1.6.2.4.2.5;6.4.2.5 XML User Role Assignment (XURA);143
1.6.2.5;6.5 Deployment Plan;143
1.6.2.6;6.6 Conclusion;145
1.6.2.7;References;145
1.6.3;Chapter 7: A Cloud Architecture for Educational Enterprises: A Case Study in Robotics;147
1.6.3.1;7.1 Introduction;148
1.6.3.2;7.2 Overview of Virtualization;149
1.6.3.3;7.3 The REAL Cloud Platform;150
1.6.3.4;7.4 REAL Cloud Implementation;155
1.6.3.4.1;7.4.1 Workflow Management System Architecture;156
1.6.3.4.2;7.4.2 Workflow Specifications;157
1.6.3.4.3;7.4.3 SIG Scheduler Layer;158
1.6.3.4.4;7.4.4 SLA Manager Layer;158
1.6.3.4.5;7.4.5 Workflow Engine Layer;158
1.6.3.5;7.5 Platform Design and Implementation;159
1.6.3.6;7.6 Experiments and Results;161
1.6.3.7;7.7 Conclusions;166
1.6.3.8;References;168
1.6.4;Chapter 8: Cloud Computing : An Enabler in Developing Business Models for Global Enterprises;170
1.6.4.1;8.1 Introduction;171
1.6.4.1.1;8.1.1 Benefits of Cloud Computing;171
1.6.4.2;8.2 Cloud Computing from Enterprises’ Perspective;172
1.6.4.2.1;8.2.1 Cloud Development Models;172
1.6.4.3;8.3 What Is New in the Cloud?;172
1.6.4.3.1;8.3.1 Cloud Computing as a Collaborative Technology;173
1.6.4.3.2;8.3.2 Data-Intensive Applications;173
1.6.4.3.3;8.3.3 Business Applications;174
1.6.4.3.4;8.3.4 Need for Business Models;174
1.6.4.3.5;8.3.5 Integration of Components in Cloud Computing;175
1.6.4.3.6;8.3.6 Storage of Data in Cloud Computing;175
1.6.4.3.7;8.3.7 Virtual Reality;176
1.6.4.4;8.4 Case Study;176
1.6.4.4.1;8.4.1 Macro-level Design for Engineering Design and Bill of Materials Models;177
1.6.4.4.2;8.4.2 Virtual Reality in Cloud Computing Environment;178
1.6.4.4.3;8.4.3 Vendors in Cloud Computing Environment;179
1.6.4.4.4;8.4.4 Device Management;179
1.6.4.4.5;8.4.5 Cloud Computing in Roa Auto Model;179
1.6.4.4.6;8.4.6 Development of a New Product in Roa Motors Ltd.;179
1.6.4.4.7;8.4.7 Summary of the Development of Roa Auto Model;180
1.6.4.5;8.5 Conclusion;180
1.6.4.6;References;182
1.6.5;Chapter 9: Using Common Logic to Provide a Semantic Enterprise Architecture Framework for Cloud Computing;183
1.6.5.1;9.1 Introduction;183
1.6.5.2;9.2 Formalising the Enterprise Architecture;185
1.6.5.2.1;9.2.1 A Common Toolset and a Common Language;185
1.6.5.2.2;9.2.2 Gathering Knowledge Across the Enterprise;186
1.6.5.3;9.3 The Advantages of a Semantic Service-Oriented Architecture;187
1.6.5.3.1;9.3.1 Service Description and Discovery;187
1.6.5.3.2;9.3.2 Semantic Business Process Management;187
1.6.5.4;9.4 TOGAF : The Upper-Ontology of OpenSEA;188
1.6.5.5;9.5 Common Logic : The Meta-Ontology of OpenSEA;188
1.6.5.6;9.6 The Extended Ontology;189
1.6.5.6.1;9.6.1 Stability and Agility;191
1.6.5.6.2;9.6.2 Formalising TOGAF;192
1.6.5.7;9.7 Conclusion;192
1.6.5.8;References;193
1.7;Part III: Issues and Challenges;194
1.7.1;Chapter 10: The Cloud Challenges for Enterprise Architects;195
1.7.1.1;10.1 Introduction;196
1.7.1.2;10.2 Next-Generation Cloud Services;196
1.7.1.2.1;10.2.1 Next-Generation Infrastructures for Cloud Enterprises;197
1.7.1.2.2;10.2.2 Cloud Infrastructure Evaluation Parameters;199
1.7.1.2.3;10.2.3 Characteristics of Responsible Cloud Infrastructure;200
1.7.1.2.4;10.2.4 Key Resources in Cloud Infrastructure Management;201
1.7.1.2.5;10.2.5 Identity Management Suite for Cloud Enterprises;202
1.7.1.3;10.3 The Impact of Cloud Computing on the Service Industry;203
1.7.1.3.1;10.3.1 Characteristics of Optimized Cloud Infrastructures;205
1.7.1.3.1.1;10.3.1.1 Standardization, Simplification, and Modularization;205
1.7.1.3.1.2;10.3.1.2 Virtualization;205
1.7.1.3.1.3;10.3.1.3 Automated Management System;205
1.7.1.3.1.4;10.3.1.4 Availability and Security;206
1.7.1.4;10.4 Cloud Issues for Enterprise Architects;206
1.7.1.4.1;10.4.1 Capabilities of Cloud Management Solutions;208
1.7.1.4.2;10.4.2 Service-Oriented Cloud Computing Architectures;208
1.7.1.4.3;10.4.3 SOCCA Layers;209
1.7.1.4.3.1;10.4.3.1 Individual Cloud Provider Layer;209
1.7.1.4.3.2;10.4.3.2 Cloud Ontology Mapping Layer;210
1.7.1.4.3.3;10.4.3.3 Cloud Broker Layer;210
1.7.1.4.3.4;10.4.3.4 SOA Layer;210
1.7.1.5;10.5 Approaches for Cloud Enablement;210
1.7.1.5.1;10.5.1 Bottom-Up Approach;210
1.7.1.5.2;10.5.2 Top-Down Approach;211
1.7.1.5.3;10.5.3 TOGAF;211
1.7.1.6;10.6 Conclusion;213
1.7.1.7;References;213
1.7.2;Chapter 11: Service Level Agreements in Cloud Computing : Perspectives of Private Consumers and Small-to-Medium Enterprises;215
1.7.2.1;11.1 Introduction;215
1.7.2.2;11.2 Dissecting Cloud SLAs;219
1.7.2.2.1;11.2.1 Subject Terms;219
1.7.2.2.2;11.2.2 Scope of Rights;219
1.7.2.2.3;11.2.3 Financial Terms;220
1.7.2.2.4;11.2.4 Representation;221
1.7.2.2.5;11.2.5 Service Credits, Credit Requests, and Compensation Procedures;221
1.7.2.2.6;11.2.6 Evolution and Support Terms;221
1.7.2.2.7;11.2.7 Warranty;222
1.7.2.2.8;11.2.8 Indemnification;222
1.7.2.2.9;11.2.9 Limitation of Liability;223
1.7.2.3;11.3 Data Concerns in Cloud SLAs: Co-existence and Balance;223
1.7.2.3.1;11.3.1 Data Security , Privacy , and Transparency Issues;223
1.7.2.3.2;11.3.2 Resolving Data Concerns in Cloud Computing;225
1.7.2.4;11.4 Stimulating Cloud Adoption: SLAs as Catalyst for Trust;226
1.7.2.4.1;11.4.1 Trust and Legal Protective Measures;226
1.7.2.4.2;11.4.2 Understanding and Technological Approaches for Brokering Trust;228
1.7.2.5;11.5 Extent of Legal Mechanisms in Protecting Users;229
1.7.2.5.1;11.5.1 Protection Ex Post and Practical Problems;229
1.7.2.5.2;11.5.2 Enforcement of Decisions and Practical Proposals;230
1.7.2.6;11.6 Conclusion;231
1.7.2.7;References;231
1.7.3;Chapter 12: Enterprise HPC on the Clouds;234
1.7.3.1;12.1 Introduction;235
1.7.3.2;12.2 Adoption Issues;236
1.7.3.2.1;12.2.1 Security;236
1.7.3.2.2;12.2.2 Performance;237
1.7.3.2.3;12.2.3 Availability;238
1.7.3.2.4;12.2.4 Integration and Interoperability;239
1.7.3.2.5;12.2.5 Customization;240
1.7.3.3;12.3 Related Research;240
1.7.3.3.1;12.3.1 Performance Studies;240
1.7.3.3.1.1;12.3.1.1 Performance Studies on the Xen Hypervisor;241
1.7.3.3.1.2;12.3.1.2 Performance Benchmarks on Amazon EC2;242
1.7.3.3.1.3;12.3.1.3 HPC Workflow Performance Evaluation on Amazon EC2;245
1.7.3.3.2;12.3.2 Scheduling Studies;246
1.7.3.3.2.1;12.3.2.1 Hybrid Cloud Scheduling Studies;246
1.7.3.3.2.2;12.3.2.2 Public Cloud Scheduling Studies;249
1.7.3.4;12.4 Implementations;250
1.7.3.4.1;12.4.1 Amazon EC2 Cluster Compute and Cluster GPU;250
1.7.3.4.2;12.4.2 Penguin on Demand;251
1.7.3.5;12.5 Conclusion;251
1.7.3.6;References;252
1.8;Part IV: Further Research and Studies;254
1.8.1;Chapter 13: Cloud Computing and the Emerging Market;255
1.8.1.1;13.1 Background;255
1.8.1.1.1;13.1.1 The Aim of This Chapter;256
1.8.1.2;13.2 Introduction;256
1.8.1.3;13.3 Delivery Models;257
1.8.1.4;13.4 Marketing Strategy;258
1.8.1.5;13.5 Target Markets;259
1.8.1.6;13.6 Major Risk: Security;259
1.8.1.7;13.7 Value Proposition;261
1.8.1.8;13.8 Clients and Vendors;261
1.8.1.9;13.9 Quality of Service;262
1.8.1.10;13.10 Marketing Campaign;263
1.8.1.11;13.11 Implementation;264
1.8.1.12;13.12 Conclusion;265
1.8.1.13;References;266
1.8.2;Chapter 14: Fair Non-repudiation Framework for Cloud Storage: Part I;268
1.8.2.1;14.1 Introduction;268
1.8.2.2;14.2 Background;270
1.8.2.2.1;14.2.1 Existing Platforms for Cloud Storage;271
1.8.2.2.2;14.2.2 Other Architectures for Secure Cloud Storage;272
1.8.2.2.3;14.2.3 Related Non-repudiation Protocols;272
1.8.2.2.3.1;14.2.3.1 Notation and Definitions;273
1.8.2.2.3.2;14.2.3.2 Non-repudiation Protocols;274
1.8.2.2.3.2.1; TPNR Protocol;275
1.8.2.2.3.2.2; MPNR Protocol;276
1.8.2.3;14.3 Overview of Security Issues in Cloud Storage;278
1.8.2.4;14.4 A Basic TPNR Protocol;280
1.8.2.4.1;14.4.1 Normal Mode;281
1.8.2.4.2;14.4.2 Resolve Mode;283
1.8.2.4.3;14.4.3 Summary;284
1.8.2.5;14.5 Conclusions;284
1.8.2.6;References;285
1.8.3;Chapter 15: Fair Non-repudiation Framework for Cloud Storage: Part II;287
1.8.3.1;15.1 Introduction;287
1.8.3.2;15.2 SWMR MPNR Protocol;288
1.8.3.2.1;15.2.1 Defense Against Collusion Attacks;289
1.8.3.2.2;15.2.2 Rollback Attack Solution Based on Merkle Hash Tree;289
1.8.3.2.3;15.2.3 Multiparty Non-repudiation Framework;291
1.8.3.2.3.1;15.2.3.1 Overview;291
1.8.3.2.3.2;15.2.3.2 Normal Mode;293
1.8.3.2.3.3;15.2.3.3 Resolve Mode;295
1.8.3.3;15.3 MWMR MPNR Protocol;295
1.8.3.4;15.4 Performance Discussion;297
1.8.3.5;15.5 Security Analysis;298
1.8.3.5.1;15.5.1 Disputes;298
1.8.3.5.2;15.5.2 Some Desirable Secure Properties;299
1.8.3.5.3;15.5.3 General Attacks;300
1.8.3.5.4;15.5.4 Specific Attack;301
1.8.3.6;15.6 Conclusions;303
1.8.3.7;References;303
1.8.4;Chapter 16: Clowns, Crowds, and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage Without Leaking Information;305
1.8.4.1;16.1 Introduction;306
1.8.4.2;16.2 Background;309
1.8.4.2.1;16.2.1 State-of-the-Art Detection Systems;311
1.8.4.2.2;16.2.2 Leak Detection at Internet Scale;312
1.8.4.2.3;16.2.3 Approaches to Plagiarism Detection;313
1.8.4.2.4;16.2.4 Defeating Plagiarism Detection Systems;314
1.8.4.3;16.3 Crowds and Clouds;316
1.8.4.4;16.4 Detecting Clowns;318
1.8.4.5;16.5 Experiments;321
1.8.4.6;16.6 Conclusions and Future Work;322
1.8.4.7;References;324
1.9;Index;327



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.