Cloud computing is becoming the next revolution in the IT industry; providing central storage for internet data and services that have the potential to bring data transmission performance, security and privacy, data deluge, and inefficient architecture to the next level Enabling the New Era of Cloud Computing: Data Security, Transfer, and Management discusses cloud computing as an emerging technology and its critical role in the IT industry upgrade and economic development in the future. This book is an essential resource for business decision makers, technology investors, architects and engineers, and cloud consumers interested in the cloud computing future.
Foreword xi
Howard A. Schmidt
Foreword xiii
Aloysius Cheang
Preface xv
Acknowledgment xxii
Section 1 Cloud Computing Overview
Chapter 1 Cloud Computing Overview 1 (24)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
The History of Cloud Computing 1 (2)
Cloud Computing Models 3 (4)
The Wave of Cloud Transformation in the 7 (11)
Global Information Industry
Exploring the Cloud Era Market Demand 18 (6)
Conclusion 24 (1)
Chapter 2 Main Components of Cloud Computing 25 (26)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Cloud Era Information Hub 25 (5)
Cloud Era Communication Networks 30 (6)
Intelligent Terminals of the Cloud Era 36 (5)
Cloud Computing and the Internet of Things 41 (8)
Conclusions and Looking to the Future 49 (2)
Chapter 3 Cloud Infrastructure: 51 (27)
Virtualization
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Virtualization Overview 51 (1)
Virtualization Processes 52 (1)
Server Virtualization 53 (8)
Storage Virtualization 61 (5)
Network Virtualization 66 (6)
Desktop Virtualization 72 (6)
Section 2 Data Management and Data Security
Chapter 4 Trusted Cloud Initiative 78 (16)
Reference Architecture
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Overview of the Reference Architecture 78 (1)
How to Use the TCI Reference Architecture 79 (1)
Security and Risk Management: Protecting 80 (3)
Data and Managing Risk
Relationships to Other Domains 83 (2)
Business Operation Support Services: 85 (3)
Partners with the Business
Technology Solution Domains 88 (6)
Chapter 5 Security Information and Event 94 (22)
Management Implementation Guidance
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Overview 95 (1)
Requirements 96 (6)
Architectural Implementation 102 (4)
Technical Implementation 106 (10)
Chapter 6 Enterprise Security Monitoring 116 (16)
with the Fusion Center Model
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Emerging Threats: Advanced Attacks 116 (1)
Problems in Defense: Inadequate 117 (3)
Actionable Information and Organizational
Silos
Countermeasure Solutions: Cross-Boundary 120 (3)
Enterprise Monitoring
Monitoring Information Sharing 123 (2)
Vision: Global Correlation and 125 (5)
Intelligence
Conclusion 130 (2)
Chapter 7 Data Protection in the Cloud Era 132 (24)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 132 (2)
Understanding the Problem 134 (6)
The Vision: Where We Want to Be 140 (1)
The Strategy: How We Get There 141 (12)
Next Steps: Considerations for Reference 153 (3)
Architecture
Section 3 Data Storage and Big Data
Chapter 8 Big Data Overview 156 (29)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 156 (1)
Big Data Definition 157 (1)
Big Data Characteristics 158 (1)
Big Data Value 159 (2)
Big Data Structure 161 (4)
Big Data Analytics 165 (6)
The Big Data Ecosystem 171 (14)
Chapter 9 Big Data Techniques, Tools, and 185 (29)
Applications
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 185 (1)
Big Data Technologies 186 (12)
Big Data Applications 198 (7)
Big Data Services 205 (9)
Section 4 Networking in the Cloud Era
Chapter 10 Cloud Computing Networks: 214 (12)
Utilizing the Content Delivery Network
Yale Li
Yushi Shen
Yudong Liu
Cloud Computing Overview 214 (1)
Opportunities and Challenges of Cloud 215 (3)
Computing
Akamai CDN Technology 218 (1)
CDN Evaluation in the Microsoft Cloud 219 (4)
Future Improvements for the Cloud CDN 223 (1)
Conclusion 224 (2)
Chapter 11 Data Transfer and Storage in 226 (12)
Cloud Computing
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 226 (3)
Related Works 229 (9)
Chapter 12 Parallel Data Transfer Protocol 238 (18)
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 239 (1)
Forward Error Correction 240 (1)
Parallel Data Transfer Challenges 241 (1)
CSTP: Cross-Stream Transfer Protocol 242 (5)
CSTP Implementation 247 (3)
Scale CSTP to Large Number of Streams 250 (3)
Conclusion 253 (3)
Chapter 13 Border Adaptive 256 (13)
Micro-Base-Station for Wireless
Communications
Henry Gao
Yushi Shen
Introduction 256 (2)
Ultimate Goal of Wireless Telecom: To 258 (1)
Provide Homogenous Service Level
Comparable to the Wired Network
Understanding of the Shannon Theory from 259 (2)
a New Angle
Enhancing the Micro-Base-Station 261 (1)
Principle to the Extreme
Centralized Time Division Multiple Access 262 (3)
(CTDMA)
Part-Time Wireless Network Operators 265 (1)
Uninterrupted Wireless Communication 265 (1)
Services During Catastrophes
Conclusion 266 (3)
Section 5 Appendix
Chapter 14 Impact of Cultural Differences 269 (15)
on the Cloud Computing Ecosystems in the
USA and China
Yushi Shen
Jie Yang
Tayfun Keskin
Introduction 270 (1)
Cloud Computing 270 (2)
Cultural Influences on Information 272 (1)
Technology (IT)
Cultural Differences Between The U.S. and 273 (3)
China and their Impact on Cloud Computing
Methodology 276 (1)
Results 277 (3)
Supporting Questions Around Culture 280 (2)
Dimensions
Analysis 282 (1)
Conclusion 282 (2)
Chapter 15 Cloud Strategy Leads Innovation 284 (6)
in China
Yushi Shen
Yale Li
Ling Wu
Shaofeng Liu
Qian Wen
Introduction 284 (1)
A New Generation of E-Government Platform 285 (2)
Micro-Entrepreneurship and Civilian 287 (1)
Innovation
Conclusion and Outlook 288 (2)
Compilation of References 290 (17)
About the Contributors 307 (3)
Index 310