Enabling the New Era of



Similar documents
Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

Managing Data in Motion

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

Virtualization and Forensics

M.Tech. Software Systems

COPYRIGHTED MATERIAL. Contents. Foreword. Acknowledgments

Strategic Management of Information Systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

NASA Information Technology Requirement

Build Your Competitive Edge in Big Data with Cisco. Rick Speyer Senior Global Marketing Manager Big Data Cisco Systems 6/25/2015

AKAMAI WHITE PAPER. The Challenges of Connecting Globally in the Pharmaceutical Industry

WJEC GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

IBM Next Generation Analytics Platform, fattore abilitante strategico per la trasformazione del business

How does Big Data disrupt the technology ecosystem of the public cloud?

Become a hunter: fi nding the true value of SIEM.

Master Data Management and Data Governance Second Edition

ANDROID SECURITY ATTACKS AND DEFENSES ABHISHEK DUBEY I ANMOL MISRA. ( r öc) CRC Press VV J Taylor & Francis Group ^ "^ Boca Raton London New York

HIMSS Survey Uncovers Critical Weaknesses In Hospital Web Security

Internet Video Streaming and Cloud-based Multimedia Applications. Outline

Data Warehousing in the Age of Big Data

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Emerging Geospatial Trends The Convergence of Technologies. Jim Steiner Vice President, Product Management

IT Networking and Security

Customer Relationship Management

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Fostering Incident Response and Digital Forensics Research

2. Cyber security research in the Netherlands

Making the Internet Business-Ready

Internet of Things. Key Enabler for the Digital Economy. Luis Jaraquemada VP Technology Huawei Chile

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Big Data Storage Architecture Design in Cloud Computing

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

The Next Wave of. Technologies. Opportunitiesfrom Chaos PHIL SIMON WILEY. John Wiley & Sons, Inc.

Mobile Multimedia Meet Cloud: Challenges and Future Directions

Research on Competitive Strategies of Telecom Operators in Post-3G Era Based on Industry Chain Value Stream

Contents. BBS Software as a Service (SaaS),7. EH introducing aoudco.pu.ing 1. Distinguishing Cloud Types 4. Exploring

SQL Server Integration Services Design Patterns

Changing the Enterprise Security Landscape

USING EXCHANGE HOSTED ENCRYPTION

Contents. Preface Acknowledgements. Chapter 1 Introduction 1.1

Java and the Internet of Things

Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Carrier Cloud Services

ASSESSMENT PLAN: M.S. in Computer Science

The Cyber Security Leap: From Laggard to Leader. April 2015

The Network Alone Can t Protect Your Data

雲 端 運 算 願 景 與 實 現 馬 維 英 博 士 微 軟 亞 洲 研 究 院 常 務 副 院 長

Available online at Available online at Advanced in Control Engineering and Information Science

The Technology System Framework of the Internet of Things and its Application Research in Agriculture

Scope of Work Microsoft Infrastructure Upgrade

Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools

State of the States: IT Trends, Priorities and Issues

Cloud Application Marketplace

Telecom Master Data For Multi-Channel Business Model

Transition Your Windows Server 2003 Infrastructure to a Modern Cisco and Microsoft Solution

JAVA 2 Network Security

Integrated Ecosystems

How To Build A Cloud Cloud For A Carrier (Nec)

... Foreword Preface... 19

Preface. Table of Contents. List of Figures. List of Tables. List of Abbreviations. 1 Introduction 1. 2 Problem 23.

Computer Security Literacy

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

ICT WP Obj. 1.3 Internet of Things and Enterprise Environments

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Code of Practice for Cyber Security in the Built Environment

Cloud Application Marketplace

The Emergence of Security Business Intelligence: Risk

IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN

1. Introduction to ehealth:

The Cloud at Your Service

Cloud Computing Service and Deployment Models:

Enterprise Performance Management Done Right. An Operating System for Your Organization. Wiley CIO

SharePoint Overview, Governance, and Planning. (^Rll^^fc^ i ip?"^biifiis:'iissiipi. Scott Jamison. Susan Hanley Mauro Cardarelli.

Federal GIS Conference February 10 11, 2014 Washington DC

Bellevue University Cybersecurity Programs & Courses

CONTENT DELIVERY NETWORKS

Transforming industries: energy and utilities. How the Internet of Things will transform the utilities industry

Networking. Cloud and Virtual. Data Storage. Greg Schulz. Your journey. effective information services. to efficient and.

Fundamentals of a Windows Server Infrastructure MOC 10967

11741 E-Business Credit Hours: Integrated Application Systems Credit Hours: Enterprise Systems Architecture Credit Hours: 3

Global Cyber Security Industry Report 2015

Convergence of Mobility, Analytics, Social and Cloud to Drive Innovation

Datenverwaltung im Wandel - Building an Enterprise Data Hub with

Cyber intelligence in an online world

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

CYBER SECURITY, A GROWING CIO PRIORITY

Metrics and Methods for Security Risk Management

Business Architecture

Frame of IoT in China

N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT

Preface Introduction

Please contact Cyber and Technology Training at for registration and pricing information.

Transcription:

Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management Yushi Shen Yale Li Ling Wu EMC2 Corporation, USA Shaofeng Liu Qian Wen Endronic Corp, USA A volume in the Advances in Systems Analysis, Software Engineering, and High Performance Computing (ASASEHPC) Book Series Information Science REFERENCE An Imprint of IGI Global

Table of Contents Foreword by HowardA. Schmidt xi Foreword by Aloysius Cheang xiii Preface xv Acknowledgment xxii Section 1 Cloud Computing Overview Chapter 1 Cloud Computing Overview 1 The History of Cloud Computing 1 Cloud Computing Models 3 The Wave of Cloud Transformation in the Global Information Industry 7 Exploring the Cloud Era Market Demand 18 Conclusion 24 Chapter 2 Main Components of Cloud Computing 25 Cloud Era Information Hub 25 Cloud Era Communication Networks 30 Intelligent Terminals ofthe Cloud Era 36 Cloud Computing and the Internet of Things 41 Conclusions and Looking to the Future 49

Chapter 3 Cloud Infrastructure: Virtualization 51 Virtualization Overview 51 Virtualization Processes 52 Server Virtualization 53 Storage Virtualization 61 Network Virtualization 66 Desktop Virtualization 72 Section 2 Data Management and Data Security Chapter 4 Trusted Cloud Initiative Reference Architecture 78 Overview of the Reference Architecture 78 How to Use the TCI Reference Architecture 79 Security and Risk Management: Protecting Data and Managing Risk 80 Relationships to Other Domains 83 Business Operation Support Services: Partners with the Business 85 Technology Solution Domains 88 Chapter 5 Security Information and Event Management Implementation Guidance 94 Overview 95 Requirements 96 Architectural Implementation 102 Technical Implementation 106

Chapter 6 Enterprise Security Monitoring with the Fusion Center Model 116 Yale Li, Emerging Threats: Advanced Attacks 116 Problems in Defense: Inadequate Actionable Information and Organizational Silos 117 Countermeasure Solutions: Cross-Boundary Enterprise Monitoring 120 Monitoring Information Sharing 123 Vision: Global Correlation and Intelligence 125 Conclusion 130 Chapter 7 Data Protection in the Cloud Era 132 132 Understanding the Problem 134 The Vision: Where We Want to Be 140 The Strategy: How We Get There 141 Next Steps: Considerations for Reference Architecture 153 Section 3 Data Storage and Big Data Chapter 8 Big Data Overview 156 156 Big Data Definition 157 Big Data Characteristics 158 Big Data Value 159 Big Data Structure 161 Big Data Analytics 165 The Big Data Ecosystem 171

Chapter 9 Big Data Techniques, Tools, and Applications Big Data Technologies 186 Big Data Applications 198 Big Data Services 205 185 185 Section 4 Networking in the Cloud Era Chapter 10 Cloud Computing Networks: Utilizing the Content Delivery Network 214 YudongLiu, Western Washington University, USA Cloud Computing Overview 214 Opportunities and Challenges of Cloud Computing 215 Akamai CDN Technology 218 CDN Evaluation in the Microsoft Cloud 219 Future Improvements for the Cloud CDN 223 Conclusion 224 Chapter 11 Data Transfer and Storage in Cloud Computing 226 Ling Wu, EMC- Corporation, USA 226 Related Works 229

Chapter 12 Parallel Data Transfer Protocol 238 Forward Error Correction Parallel Data Transfer Challenges 241 CSTP: Cross-Stream Transfer Protocol CSTP Implementation 247 Scale CSTP to Large Number of Streams 250 Conclusion 239 240 242 253 Chapter 13 Border Adaptive Micro-Base-Station for Wireless Communications 256 Henry Gao, Glocom Inc.. USA Ultimate Goal of Wireless Telecom: To Provide Homogenous Service Level Comparable 256 to the Wired Network 258 Understanding of the Shannon Theory from a New Angle 259 Enhancing the Micro-Base-Station Principle to the Extreme 261 Centralized Time Division Multiple Access (CTDMA) 262 Part-Time Wireless Network Operators 265 Uninterrupted Wireless Communication Services During Catastrophes 265 Conclusion 266 Section 5 Appendix Chapter 14 Impact of Cultural Differences on the Cloud Computing Ecosystems in the USA and China 269 Jie Yang, Tayfun Keskin, University of Washington, USA 270 Cloud Computing 270 Cultural Influences on Information Technology (IT) 272 Cultural Differences Between The U.S. and China and their Impact on Cloud Computing 273 Methodology 276 Results Supporting Questions Around Culture Dimensions 280 Analysis 282 Conclusion 282 277

Chapter 15 Cloud Strategy Leads Innovation in China 284 284 A New Generation of E-Government Platform 285 Micro-Entrepreneurship and Civilian Innovation 287 Conclusion and Outlook 288 Compilation of References 290 About the Contributors 307 Index 310