Kaiqi Xiong 
Resource Optimization and Security for Cloud Services [EPUB ebook] 

Support
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These Qo S metrics are clearly defined and their quantitative analysis provided. The authors then take into account these Qo S metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.
€139.99
méthodes de payement

Table des matières

Preface ix

Chapter 1. Introduction 1

Chapter 2. Current Approaches for Resource Optimization and
Security 13

Chapter 3. Single Class Customers 27

Chapter 4. Multiple-Class Customers 69

Chapter 5. A Trustworthy Service Model 95

Chapter 6. Performance Analysis of Public-Key Cryptography-Based
Group Authentication 141

Chapter 7. Summary and Future Work 173

Bibliography 181

Index 193

A propos de l’auteur

Kaiqi Xiong is currently researching and teaching in the Department of Computing Security at Rochester Institute of Technology, USA. He has published more than 60 refereed journal and conference papers including over 25 refereed leading journal papers, over 35 refereed leading conference proceedings, and two IBM patents in computer networks.
Achetez cet ebook et obtenez-en 1 de plus GRATUITEMENT !
Langue Anglais ● Format EPUB ● Pages 192 ● ISBN 9781118898567 ● Taille du fichier 6.8 MB ● Maison d’édition John Wiley & Sons ● Publié 2014 ● Édition 1 ● Téléchargeable 24 mois ● Devise EUR ● ID 2952524 ● Protection contre la copie Adobe DRM
Nécessite un lecteur de livre électronique compatible DRM

Plus d’ebooks du même auteur(s) / Éditeur

18 309 Ebooks dans cette catégorie