E-Book, Englisch, 330 Seiten
Mahmood / Hill Cloud Computing for Enterprise Architectures
1. Auflage 2011
ISBN: 978-1-4471-2236-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, 330 Seiten
Reihe: Computer Communications and Networks
ISBN: 978-1-4471-2236-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This important text provides a single point of reference for state-of-the-art cloud computing design and implementation techniques. The book examines cloud computing from the perspective of enterprise architecture, asking the question; how do we realize new business potential with our existing enterprises? Topics and features: with a Foreword by Thomas Erl; contains contributions from an international selection of preeminent experts; presents the state-of-the-art in enterprise architecture approaches with respect to cloud computing models, frameworks, technologies, and applications; discusses potential research directions, and technologies to facilitate the realization of emerging business models through enterprise architecture approaches; provides relevant theoretical frameworks, and the latest empirical research findings.
Autoren/Hrsg.
Weitere Infos & Material
1;Cloud Computing for Enterprise Architectures;3
1.1;Foreword;7
1.2;Preface;9
1.2.1;Overview and Goals;9
1.2.2;Organization and Features;9
1.2.3;Target Audiences;10
1.2.4;Suggested Uses;10
1.2.5;Acknowledgements;11
1.3;Contents;13
1.4;Contributors;15
1.5;Part I: Concepts and Principles;19
1.5.1;Chapter 1: Cloud Computing for Enterprise Architectures: Concepts, Principles and Approaches;20
1.5.1.1;1.1 Introduction;20
1.5.1.2;1.2 Cloud Computing;22
1.5.1.2.1;1.2.1 Characteristics, Promise and Benefits;22
1.5.1.2.2;1.2.2 Deployment Approaches;23
1.5.1.2.2.1;1.2.2.1 Software as a Service (SaaS);24
1.5.1.2.2.2;1.2.2.2 Platform as a Service (PaaS);25
1.5.1.2.2.3;1.2.2.3 Infrastructure as a Service (IaaS);26
1.5.1.2.2.4;1.2.2.4 Extended Frameworks;26
1.5.1.2.3;1.2.3 Issues and Challenges;27
1.5.1.2.4;1.2.4 Cloud Technologies;27
1.5.1.3;1.3 Enterprise Architectures;29
1.5.1.3.1;1.3.1 Enterprise Architecture Frameworks;29
1.5.1.4;1.4 Cloud Computing and Enterprise Architectures;30
1.5.1.4.1;1.4.1 The Way Forward;32
1.5.1.5;1.5 Conclusion;34
1.5.1.6;References;34
1.5.2;Chapter 2: Enterprise Architecture Fundamentals;37
1.5.2.1;2.1 Introduction;37
1.5.2.2;2.2 Aligning Business and Technological Needs;38
1.5.2.3;2.3 Towards a Framework for EA;39
1.5.2.4;2.4 Service-Oriented Architecture;40
1.5.2.5;2.5 Some Definitions;41
1.5.2.5.1;2.5.1 What Is an Architecture?;41
1.5.2.5.2;2.5.2 What Is an Enterprise?;42
1.5.2.5.3;2.5.3 Enterprise Architecture;42
1.5.2.6;2.6 Towards an EA Typology;44
1.5.2.6.1;2.6.1 IT-Centric EA;44
1.5.2.6.2;2.6.2 Business Process-Centric Enterprise Architecture;46
1.5.2.6.3;2.6.3 Governance-Centric Enterprise Architecture;47
1.5.2.7;2.7 Assessing the Benefits of Enterprise Architecture;47
1.5.2.7.1;2.7.1 EA Contributions for the Business;48
1.5.2.7.2;2.7.2 EA Contributions for IT Infrastructure;52
1.5.2.8;2.8 Discussion;55
1.5.2.8.1;2.8.1 EA Contributions to SOA;55
1.5.2.8.2;2.8.2 SOA Contributions to EA;56
1.5.2.9;2.9 Conclusion;56
1.5.2.10;References;56
1.5.3;Chapter 3: Cloud Computing Business Models;58
1.5.3.1;3.1 Introduction;58
1.5.3.2;3.2 Business Models and the Cloud Layers;59
1.5.3.3;3.3 Cloud Computing Layers;60
1.5.3.4;3.4 Business Models of the Cloud;62
1.5.3.5;3.5 Infrastructure as a Service (IaaS);63
1.5.3.6;3.6 IaaS Variants;65
1.5.3.7;3.7 Platform as a Service (PaaS);67
1.5.3.8;3.8 Software as a Service (SaaS);68
1.5.3.9;3.9 The Cloud and the Evolving Relationships;71
1.5.3.10;3.10 Conclusion;73
1.5.3.11;References;74
1.5.4;Chapter 4: The Convergence of Enterprise Architecture (EA) and Cloud Computing;76
1.5.4.1;4.1 Introduction;77
1.5.4.2;4.2 Next Generation Enterprises: The IT Requirements;77
1.5.4.2.1;4.2.1 Next-Generation Service Delivery Networks;79
1.5.4.3;4.3 Elucidating the Evolving Cloud Idea;80
1.5.4.3.1;4.3.1 The Cloud Realization Technologies;82
1.5.4.3.2;4.3.2 The Cloud-Induced Innovations on Enterprise Architecture;83
1.5.4.3.3;4.3.3 Why Cloud Enablement?;84
1.5.4.3.4;4.3.4 Implementing Smarter Environments via Clouds;85
1.5.4.3.5;4.3.5 Application Domains;85
1.5.4.4;4.4 Enterprise Architecture and Cloud Computing;86
1.5.4.4.1;4.4.1 Briefing Enterprise Architecture (EA);86
1.5.4.4.2;4.4.2 The Cloud Implications;88
1.5.4.4.3;4.4.3 Cloud Processes;89
1.5.4.4.4;4.4.4 Event-Driven Business Processes;90
1.5.4.4.5;4.4.5 Communication-Enabled Business Processes (CEBP);90
1.5.4.4.6;4.4.6 Cloud-Impacted Business Processes;91
1.5.4.5;4.5 A Strategy for Establishing Enterprise Private Clouds;91
1.5.4.5.1;4.5.1 Why Private Clouds?;93
1.5.4.6;4.6 Cloud-Enabled Enterprise Communications;94
1.5.4.6.1;4.6.1 Virtualization for the Communication Industry;95
1.5.4.6.2;4.6.2 Cloud Inspires the UC Paradigm;96
1.5.4.6.3;4.6.3 Communication as a Service (CaaS);96
1.5.4.7;4.7 Cloud-Enablement Strategy;97
1.5.4.7.1;4.7.1 Cloud-Enabled Enterprise: The Transition Methodology;97
1.5.4.7.1.1;4.7.1.1 Service Categorization;97
1.5.4.7.1.2;4.7.1.2 Service Selection;98
1.5.4.7.1.3;4.7.1.3 Service Selection Attributes for Cloud-Based Delivery;98
1.5.4.7.1.4;4.7.1.4 Right Services for Clouds: The Selection Approach;98
1.5.4.7.2;4.7.2 Cloud Participation;99
1.5.4.7.3;4.7.3 Contract in the Cloud;99
1.5.4.7.3.1;4.7.3.1 Cloud Contract Characteristics;100
1.5.4.7.3.2;4.7.3.2 Leveraging EA Frameworks for Cloud Strategy;100
1.5.4.7.3.3;4.7.3.3 Role of EA in Defining the Contracts with CSPs and CSBs;101
1.5.4.8;4.8 Conclusion;101
1.5.4.9;References;102
1.6;Part II: Approaches and Frameworks;103
1.6.1;Chapter 5: Component-Based Development for Cloud Computing Architectures;104
1.6.1.1;5.1 Introduction;104
1.6.1.2;5.2 Background and Characteristics of Cloud Computing;106
1.6.1.3;5.3 Cloud Services;109
1.6.1.4;5.4 Service-Oriented Component Architectures;110
1.6.1.5;5.5 Characteristics of Service-Oriented Systems for the Cloud;111
1.6.1.6;5.6 Development Process Model for Cloud Applications;112
1.6.1.7;5.7 Best Practice Software Design Guidelines;114
1.6.1.8;5.8 Component Model for Cloud Applications and Services;116
1.6.1.8.1;5.8.1 Component Model and Design Guidelines for Security in Cloud Computing;117
1.6.1.8.2;5.8.2 Component Model and Design Guidelines for Software as a Service (SaaS);118
1.6.1.8.3;5.8.3 Component Model and Design Guidelines for Platform as a Service (PaaS);120
1.6.1.8.4;5.8.4 Component Model and Design Guidelines for Infrastructure as a Service (IaaS);121
1.6.1.8.5;5.8.5 Component Composition for Amazon Cloud Architecture;123
1.6.1.9;5.9 Conclusion;126
1.6.1.10;References;126
1.6.2;Chapter 6: Identity and Access Management in Cloud Computing;128
1.6.2.1;6.1 Introduction;129
1.6.2.2;6.2 Cloud Computing Market;129
1.6.2.3;6.3 Related Work;130
1.6.2.4;6.4 Proposed Identity and Access Management (IAM) Model;134
1.6.2.4.1;6.4.1 Analysis and Design;134
1.6.2.4.1.1;6.4.1.1 Access Control E nforcement Unit (ACEU);134
1.6.2.4.1.2;6.4.1.2 Access Contro l Decision Unit (ACDU);135
1.6.2.4.1.3;6.4.1.3 User Registration;136
1.6.2.4.1.4;6.4.1.4 User Login;137
1.6.2.4.1.5;6.4.1.5 Kerberos Authentication;138
1.6.2.4.1.6;6.4.1.6 Access Granting;139
1.6.2.4.2;6.4.2 Defining Policies in XML;139
1.6.2.4.2.1;6.4.2.1 XML Permission Sheet;139
1.6.2.4.2.2;6.4.2.2 XML Credential Type Definition (XCredTypeDef);141
1.6.2.4.2.3;6.4.2.3 XML Role Sheet (XRS);141
1.6.2.4.2.4;6.4.2.4 XML Permission Role Assignment (XPRA);141
1.6.2.4.2.5;6.4.2.5 XML User Role Assignment (XURA);143
1.6.2.5;6.5 Deployment Plan;143
1.6.2.6;6.6 Conclusion;145
1.6.2.7;References;145
1.6.3;Chapter 7: A Cloud Architecture for Educational Enterprises: A Case Study in Robotics;147
1.6.3.1;7.1 Introduction;148
1.6.3.2;7.2 Overview of Virtualization;149
1.6.3.3;7.3 The REAL Cloud Platform;150
1.6.3.4;7.4 REAL Cloud Implementation;155
1.6.3.4.1;7.4.1 Workflow Management System Architecture;156
1.6.3.4.2;7.4.2 Workflow Specifications;157
1.6.3.4.3;7.4.3 SIG Scheduler Layer;158
1.6.3.4.4;7.4.4 SLA Manager Layer;158
1.6.3.4.5;7.4.5 Workflow Engine Layer;158
1.6.3.5;7.5 Platform Design and Implementation;159
1.6.3.6;7.6 Experiments and Results;161
1.6.3.7;7.7 Conclusions;166
1.6.3.8;References;168
1.6.4;Chapter 8: Cloud Computing : An Enabler in Developing Business Models for Global Enterprises;170
1.6.4.1;8.1 Introduction;171
1.6.4.1.1;8.1.1 Benefits of Cloud Computing;171
1.6.4.2;8.2 Cloud Computing from Enterprises’ Perspective;172
1.6.4.2.1;8.2.1 Cloud Development Models;172
1.6.4.3;8.3 What Is New in the Cloud?;172
1.6.4.3.1;8.3.1 Cloud Computing as a Collaborative Technology;173
1.6.4.3.2;8.3.2 Data-Intensive Applications;173
1.6.4.3.3;8.3.3 Business Applications;174
1.6.4.3.4;8.3.4 Need for Business Models;174
1.6.4.3.5;8.3.5 Integration of Components in Cloud Computing;175
1.6.4.3.6;8.3.6 Storage of Data in Cloud Computing;175
1.6.4.3.7;8.3.7 Virtual Reality;176
1.6.4.4;8.4 Case Study;176
1.6.4.4.1;8.4.1 Macro-level Design for Engineering Design and Bill of Materials Models;177
1.6.4.4.2;8.4.2 Virtual Reality in Cloud Computing Environment;178
1.6.4.4.3;8.4.3 Vendors in Cloud Computing Environment;179
1.6.4.4.4;8.4.4 Device Management;179
1.6.4.4.5;8.4.5 Cloud Computing in Roa Auto Model;179
1.6.4.4.6;8.4.6 Development of a New Product in Roa Motors Ltd.;179
1.6.4.4.7;8.4.7 Summary of the Development of Roa Auto Model;180
1.6.4.5;8.5 Conclusion;180
1.6.4.6;References;182
1.6.5;Chapter 9: Using Common Logic to Provide a Semantic Enterprise Architecture Framework for Cloud Computing;183
1.6.5.1;9.1 Introduction;183
1.6.5.2;9.2 Formalising the Enterprise Architecture;185
1.6.5.2.1;9.2.1 A Common Toolset and a Common Language;185
1.6.5.2.2;9.2.2 Gathering Knowledge Across the Enterprise;186
1.6.5.3;9.3 The Advantages of a Semantic Service-Oriented Architecture;187
1.6.5.3.1;9.3.1 Service Description and Discovery;187
1.6.5.3.2;9.3.2 Semantic Business Process Management;187
1.6.5.4;9.4 TOGAF : The Upper-Ontology of OpenSEA;188
1.6.5.5;9.5 Common Logic : The Meta-Ontology of OpenSEA;188
1.6.5.6;9.6 The Extended Ontology;189
1.6.5.6.1;9.6.1 Stability and Agility;191
1.6.5.6.2;9.6.2 Formalising TOGAF;192
1.6.5.7;9.7 Conclusion;192
1.6.5.8;References;193
1.7;Part III: Issues and Challenges;194
1.7.1;Chapter 10: The Cloud Challenges for Enterprise Architects;195
1.7.1.1;10.1 Introduction;196
1.7.1.2;10.2 Next-Generation Cloud Services;196
1.7.1.2.1;10.2.1 Next-Generation Infrastructures for Cloud Enterprises;197
1.7.1.2.2;10.2.2 Cloud Infrastructure Evaluation Parameters;199
1.7.1.2.3;10.2.3 Characteristics of Responsible Cloud Infrastructure;200
1.7.1.2.4;10.2.4 Key Resources in Cloud Infrastructure Management;201
1.7.1.2.5;10.2.5 Identity Management Suite for Cloud Enterprises;202
1.7.1.3;10.3 The Impact of Cloud Computing on the Service Industry;203
1.7.1.3.1;10.3.1 Characteristics of Optimized Cloud Infrastructures;205
1.7.1.3.1.1;10.3.1.1 Standardization, Simplification, and Modularization;205
1.7.1.3.1.2;10.3.1.2 Virtualization;205
1.7.1.3.1.3;10.3.1.3 Automated Management System;205
1.7.1.3.1.4;10.3.1.4 Availability and Security;206
1.7.1.4;10.4 Cloud Issues for Enterprise Architects;206
1.7.1.4.1;10.4.1 Capabilities of Cloud Management Solutions;208
1.7.1.4.2;10.4.2 Service-Oriented Cloud Computing Architectures;208
1.7.1.4.3;10.4.3 SOCCA Layers;209
1.7.1.4.3.1;10.4.3.1 Individual Cloud Provider Layer;209
1.7.1.4.3.2;10.4.3.2 Cloud Ontology Mapping Layer;210
1.7.1.4.3.3;10.4.3.3 Cloud Broker Layer;210
1.7.1.4.3.4;10.4.3.4 SOA Layer;210
1.7.1.5;10.5 Approaches for Cloud Enablement;210
1.7.1.5.1;10.5.1 Bottom-Up Approach;210
1.7.1.5.2;10.5.2 Top-Down Approach;211
1.7.1.5.3;10.5.3 TOGAF;211
1.7.1.6;10.6 Conclusion;213
1.7.1.7;References;213
1.7.2;Chapter 11: Service Level Agreements in Cloud Computing : Perspectives of Private Consumers and Small-to-Medium Enterprises;215
1.7.2.1;11.1 Introduction;215
1.7.2.2;11.2 Dissecting Cloud SLAs;219
1.7.2.2.1;11.2.1 Subject Terms;219
1.7.2.2.2;11.2.2 Scope of Rights;219
1.7.2.2.3;11.2.3 Financial Terms;220
1.7.2.2.4;11.2.4 Representation;221
1.7.2.2.5;11.2.5 Service Credits, Credit Requests, and Compensation Procedures;221
1.7.2.2.6;11.2.6 Evolution and Support Terms;221
1.7.2.2.7;11.2.7 Warranty;222
1.7.2.2.8;11.2.8 Indemnification;222
1.7.2.2.9;11.2.9 Limitation of Liability;223
1.7.2.3;11.3 Data Concerns in Cloud SLAs: Co-existence and Balance;223
1.7.2.3.1;11.3.1 Data Security , Privacy , and Transparency Issues;223
1.7.2.3.2;11.3.2 Resolving Data Concerns in Cloud Computing;225
1.7.2.4;11.4 Stimulating Cloud Adoption: SLAs as Catalyst for Trust;226
1.7.2.4.1;11.4.1 Trust and Legal Protective Measures;226
1.7.2.4.2;11.4.2 Understanding and Technological Approaches for Brokering Trust;228
1.7.2.5;11.5 Extent of Legal Mechanisms in Protecting Users;229
1.7.2.5.1;11.5.1 Protection Ex Post and Practical Problems;229
1.7.2.5.2;11.5.2 Enforcement of Decisions and Practical Proposals;230
1.7.2.6;11.6 Conclusion;231
1.7.2.7;References;231
1.7.3;Chapter 12: Enterprise HPC on the Clouds;234
1.7.3.1;12.1 Introduction;235
1.7.3.2;12.2 Adoption Issues;236
1.7.3.2.1;12.2.1 Security;236
1.7.3.2.2;12.2.2 Performance;237
1.7.3.2.3;12.2.3 Availability;238
1.7.3.2.4;12.2.4 Integration and Interoperability;239
1.7.3.2.5;12.2.5 Customization;240
1.7.3.3;12.3 Related Research;240
1.7.3.3.1;12.3.1 Performance Studies;240
1.7.3.3.1.1;12.3.1.1 Performance Studies on the Xen Hypervisor;241
1.7.3.3.1.2;12.3.1.2 Performance Benchmarks on Amazon EC2;242
1.7.3.3.1.3;12.3.1.3 HPC Workflow Performance Evaluation on Amazon EC2;245
1.7.3.3.2;12.3.2 Scheduling Studies;246
1.7.3.3.2.1;12.3.2.1 Hybrid Cloud Scheduling Studies;246
1.7.3.3.2.2;12.3.2.2 Public Cloud Scheduling Studies;249
1.7.3.4;12.4 Implementations;250
1.7.3.4.1;12.4.1 Amazon EC2 Cluster Compute and Cluster GPU;250
1.7.3.4.2;12.4.2 Penguin on Demand;251
1.7.3.5;12.5 Conclusion;251
1.7.3.6;References;252
1.8;Part IV: Further Research and Studies;254
1.8.1;Chapter 13: Cloud Computing and the Emerging Market;255
1.8.1.1;13.1 Background;255
1.8.1.1.1;13.1.1 The Aim of This Chapter;256
1.8.1.2;13.2 Introduction;256
1.8.1.3;13.3 Delivery Models;257
1.8.1.4;13.4 Marketing Strategy;258
1.8.1.5;13.5 Target Markets;259
1.8.1.6;13.6 Major Risk: Security;259
1.8.1.7;13.7 Value Proposition;261
1.8.1.8;13.8 Clients and Vendors;261
1.8.1.9;13.9 Quality of Service;262
1.8.1.10;13.10 Marketing Campaign;263
1.8.1.11;13.11 Implementation;264
1.8.1.12;13.12 Conclusion;265
1.8.1.13;References;266
1.8.2;Chapter 14: Fair Non-repudiation Framework for Cloud Storage: Part I;268
1.8.2.1;14.1 Introduction;268
1.8.2.2;14.2 Background;270
1.8.2.2.1;14.2.1 Existing Platforms for Cloud Storage;271
1.8.2.2.2;14.2.2 Other Architectures for Secure Cloud Storage;272
1.8.2.2.3;14.2.3 Related Non-repudiation Protocols;272
1.8.2.2.3.1;14.2.3.1 Notation and Definitions;273
1.8.2.2.3.2;14.2.3.2 Non-repudiation Protocols;274
1.8.2.2.3.2.1; TPNR Protocol;275
1.8.2.2.3.2.2; MPNR Protocol;276
1.8.2.3;14.3 Overview of Security Issues in Cloud Storage;278
1.8.2.4;14.4 A Basic TPNR Protocol;280
1.8.2.4.1;14.4.1 Normal Mode;281
1.8.2.4.2;14.4.2 Resolve Mode;283
1.8.2.4.3;14.4.3 Summary;284
1.8.2.5;14.5 Conclusions;284
1.8.2.6;References;285
1.8.3;Chapter 15: Fair Non-repudiation Framework for Cloud Storage: Part II;287
1.8.3.1;15.1 Introduction;287
1.8.3.2;15.2 SWMR MPNR Protocol;288
1.8.3.2.1;15.2.1 Defense Against Collusion Attacks;289
1.8.3.2.2;15.2.2 Rollback Attack Solution Based on Merkle Hash Tree;289
1.8.3.2.3;15.2.3 Multiparty Non-repudiation Framework;291
1.8.3.2.3.1;15.2.3.1 Overview;291
1.8.3.2.3.2;15.2.3.2 Normal Mode;293
1.8.3.2.3.3;15.2.3.3 Resolve Mode;295
1.8.3.3;15.3 MWMR MPNR Protocol;295
1.8.3.4;15.4 Performance Discussion;297
1.8.3.5;15.5 Security Analysis;298
1.8.3.5.1;15.5.1 Disputes;298
1.8.3.5.2;15.5.2 Some Desirable Secure Properties;299
1.8.3.5.3;15.5.3 General Attacks;300
1.8.3.5.4;15.5.4 Specific Attack;301
1.8.3.6;15.6 Conclusions;303
1.8.3.7;References;303
1.8.4;Chapter 16: Clowns, Crowds, and Clouds: A Cross-Enterprise Approach to Detecting Information Leakage Without Leaking Information;305
1.8.4.1;16.1 Introduction;306
1.8.4.2;16.2 Background;309
1.8.4.2.1;16.2.1 State-of-the-Art Detection Systems;311
1.8.4.2.2;16.2.2 Leak Detection at Internet Scale;312
1.8.4.2.3;16.2.3 Approaches to Plagiarism Detection;313
1.8.4.2.4;16.2.4 Defeating Plagiarism Detection Systems;314
1.8.4.3;16.3 Crowds and Clouds;316
1.8.4.4;16.4 Detecting Clowns;318
1.8.4.5;16.5 Experiments;321
1.8.4.6;16.6 Conclusions and Future Work;322
1.8.4.7;References;324
1.9;Index;327




