LEADER 04932nam 2200577 450 001 9910812737203321 005 20200520144314.0 010 $a1-118-89859-1 010 $a1-118-89876-1 035 $a(CKB)2670000000530804 035 $a(EBL)1638159 035 $a(OCoLC)871224266 035 $a(Au-PeEL)EBL1638159 035 $a(CaPaEBR)ebr10842274 035 $a(CaONFJC)MIL578586 035 $a(MiAaPQ)EBC1638159 035 $a(PPN)189808446 035 $a(EXLCZ)992670000000530804 100 $a20140310h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aResource optimization and security for cloud services /$fKaiqi Xiong ; series editor, Harry Perros 210 1$aLondon ;$aHoboken, New Jersey :$cISTE :$cWiley,$d2014. 210 4$dİ2014 215 $a1 online resource (208 p.) 225 0 $aNetworks and telecommunications series 300 $aDescription based upon print version of record. 311 $a1-84821-599-1 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Contents; Preface; Chapter 1. Introduction; 1.1. Motivation; 1.2. The problems; 1.3. Summary of contributions; 1.4. The organization of this book; Chapter 2. Current Approaches for Resource Optimization and Security; 2.1. Service availability; 2.2. Trustworthiness; 2.3. Performance; 2.4. The resource optimization problem subject to an SLA; 2.5. Public-key cryptography-based authentication; Chapter 3. Single Class Customers; 3.1. The percentile of response time; 3.2. A resource optimization problem for service models with single-class customers 327 $a3.3. Approaches for the resource optimization3.4. Numerical validations; 3.5. The balanced condition; 3.6. Services Performance Modeling and Analysis in a Simple Scenario of Cloud Computing; 3.6.1. Overview; 3.6.2. A computer service performance model; 3.6.3. A numerical validation; 3.6.4. Discussions; 3.7. Concluding remarks; Chapter 4. Multiple-Class Customers; 4.1. The SLA performance metric in the case of multiple class customers; 4.2. The resource optimization problem for multiple customer services; 4.2.1. Resource optimization problem for multiple class customers 327 $a4.3. Approaches for resource optimization4.3.1. The LSTs of response time distributions for two priority customers; 4.3.2. Algorithms for the resource optimization problem; 4.4. Numerical validations; 4.5. Concluding remarks; Chapter 5. A Trustworthy Service Model; 5.1. The trust-based resource optimization problem; 5.2. A framework for solving the trust-based resource provisioning problem; 5.3. The calculation of SLA metrics; 5.3.1. The trustworthiness of resource sites; 5.3.2. The percentile response time; 5.3.3. The service availability 327 $a5.4. An approach for solving the trust-based resource provisioning problem5.4.1. Single-class customers; 5.4.2. Multiple priority customers; 5.5. Numerical examples; 5.5.1. Single-class customers; 5.5.2. Multiple priority customers; 5.6. Concluding remarks; Chapter 6. Performance Analysis of Public-Key Cryptography-Based Group Authentication; 6.1. Public-key cryptography-based authentication; 6.2. PKCROSS and PKTAPP; 6.2.1. Protocol analysis; 6.2.2. The calculation of the response time via queuing networks; 6.3. A new group authentication technique using public-key cryptography 327 $a6.3.1. A single remote realm6.3.2. Multiple remote realms; 6.4. Performance evaluation of the new proposed technique; 6.4.1. The operations of encryption and decryption; 6.4.2. The calculation of the response time via a queuing network; 6.4.3. Discussions; 6.5. Concluding remarks; Chapter 7. Summary and Future Work; 7.1. Research summary of the book; 7.2. Future research directions; Bibliography; Index 330 $a This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution i 410 0$aISTE 606 $aCloud computing$xSecurity measures 615 0$aCloud computing$xSecurity measures. 676 $a005.8 700 $aXiong$b Kaiqi$01700908 701 $aPerros$b Harry$01700909 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910812737203321 996 $aResource optimization and security for cloud services$94084275 997 $aUNINA