18.1 Sunstone login form.
65 18.2 Change password of oneadmin or other users.
66 18.3 Add worker node as host.
67 18.4 Apps that can be downloaded.
68 18.5 Available images that were downloaded.
69 18.6 VM templates.
70 18.7 Running VM.
71 18.8 Accessing the VM via VNC.
72 19.1 OpenStack architecture.
73 19.2 OpenStack object storage.
74 19.3 OpenStack logical architecture.
75 19.4 Hardware requirements.
76 19.5 Networking option 1: Provider networks.
77 19.6 Networking option 2: Self-service networks.
78 20.1 Eucalyptus architecture.
79 20.2 Eucalyptus components.
80 20.3 Eucalyptus services placement.
List of Tables
1 1.1 A comparison-based study of cluster, grid and cloud.
2 2.1 Shared responsibility model for security of cloud computing.
3 3.1 Workflow tools in cloud computing.
4 4.1 Traditional computing vs. cloud computing.
5 8.1 A comparison of ACID-based and NoACID-based cloud databases.
6 10.1 Auditing algorithms and services.
7 12.1 Comparative analysis of strengths and limitations of some of the existing security schemes.
8 19.1 OpenStack vs. AWS.
Foreword
This book discusses the evolution of cloud computing through grid computing and cluster computing. The main purpose of this book is to include all the cloud-related technologies in a single platform, so that undergraduate and postgraduate students, researchers, academicians, and those in industry can easily understand the cloud-based ecosystems. This book will take the reader on a journey that begins with understanding the cloud infrastructure paradigm in cloud-enabled technologies and how it can be applied in various ways. It will help researchers and practitioners to understand grid and distributed computing, cloud infrastructure, virtual machine, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art in cloud computing countermeasures.
This book covers a wide range of cloud computing-related technologies. The wide-ranging contents will differentiate this book from others. The topics are likely to be embedded with various aspects of cloud business model-enabled technologies. It aims to provide the concepts of related technologies based on novel findings of the researchers through its chapter organization. The primary audience for the book includes specialists, researchers, undergraduate students, designers, experts and engineers who are occupied with research.
The book is organized in independent chapters to provide greater readability, adaptability and flexibility to readers.
Souvik Pal
Dac-Nhuong Le
Prasant Kumar Pattnaik
Preface
Recently, cloud computing has been one of the emerging technologies in the fields of computer science and information technology (IT). The advancement of cloud computing has resulted from the fast-growing use of the internet among people. This book is intended for readers who have no prior knowledge of this subject. Some topics in this book are unique and based on published information, both current and timely, which will be helpful to research scholars as well as specialists working in cloud computing-related issues. It is suitable as an introductory text for a semester-length course in cloud computing for undergraduate and postgraduate science courses in computer science and information technology. The authors decided to work on an introductory textbook on this subject for the benefit of students and teachers. Some topics in this book are unique and based on published information which is both current and timely.
The key features of the book are as follows:
Discusses the evolution of cloud computing from grid computing, cluster computing, and distributed system.
Provides coverage of cloud computing environments and popular views of them.
Incorporates a survey of the virtualization environment and its latest developments.
Discusses live migration, database, auditing and applications as part of the materials related to cloud computing.
Provides concepts of cloud storage, cloud strategy planning and management, cloud security and privacy issues.
Explains complex concepts in a very simple manner.
Covers information appropriate for beginners as well as advanced users.
Presents information using layman’s terms and clear language.
Widely covers the latest topics.
Extensively uses analogies.
Souvik PalDac-Nhuong LePrasant Kumar PattnaikMarch 2022
Acknowledgments
First of all, we would like to thank all our colleagues and friends for sharing our happiness at the start of this project and following up with their encouragement when it seemed too difficult to complete. We are thankful to all the members of Scrivener Publishing, especially Martin Scrivener and Phillip Carmical, for giving us the opportunity to write this book.
Dr. Pal is grateful to his father, Prof. Bharat Kumar Pal, and mother, Smt. Tandra Pal, for their blessings and constant support. He is also grateful to his grandmother, the late Sakhi Rani Pal, and grandfater, the late Ajit Kumar Pal, for their affection and motivation. He is thankful to his beloved wife, Smita, and son, Binayak, for their love and encouragement.
Dr. Dac-Nhuong Le would like to acknowledge and thank the most important people in his life, his patents and his partner, for their support. This book has been a long-cherished dream which would not have been turned into reality without the support and love of these amazing people, who encouraged him with the right amount of time and attention. He is also grateful to his best friends for their blessings and unconditional love, patience and encouragement.
Prof. Pattnaik is grateful to his father, the late Ramanarayan Patnaik, his mother, Smt. Jayalakshimi Patnaik, his father-in-law,