Published by Pearson (February 27, 2024) © 2024
Thomas Erl | Eric MonroyCloud Computing: Concepts, Technology, Security & Architecture
Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services.
In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included.
All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.
Foreword
About the Authors
Acknowledgments
Chapter 1: Introduction
1.1 Objectives of This Book
1.2 What This Book Does Not Cover
1.3 Who This Book Is For
1.4 How This Book Is Organized
Part I: Fundamental Cloud Computing
Chapter 3: Understanding Cloud Computing
Chapter 4: Fundamental Concepts and Models
Chapter 5: Cloud-Enabling Technology
Chapter 6: Understanding Containerization
Chapter 7: Understanding Cloud Security and Cybersecurity
Part II: Cloud Computing Mechanisms
Chapter 8: Cloud Infrastructure Mechanisms
Chapter 9: Specialized Cloud Mechanisms
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
Chapter 12: Cloud Management Mechanisms
Part III: Cloud Computing Architecture
Chapter 13: Fundamental Cloud Architectures
Chapter 14: Advanced Cloud Architectures
Chapter 15: Specialized Cloud Architectures
Part IV: Working with Clouds
Chapter 16: Cloud Delivery Model Considerations
Chapter 17: Cost Metrics and Pricing Models
Chapter 18: Service Quality Metrics and SLAs
Part V: Appendices
Appendix A: Case Study Conclusions
Appendix B: Common Containerization Technologies
1.5 Resources
Pearson Digital Enterprise Book Series
Thomas Erl on YouTube
The Digital Enterprise Newsletter on LinkedIn
Cloud Certified Professional (CCP) Program
Chapter 2: Case Study Background
2.1 Case Study #1: ATN
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.2 Case Study #2: DTGOV
Technical Infrastructure and Environment
Business Goals and New Strategy
Roadmap and Implementation Strategy
2.3 Case Study #3: Innovartus Technologies Inc.
Technical Infrastructure and Environment
Business Goals and Strategy
Roadmap and Implementation Strategy
PART I: FUNDAMENTAL CLOUD COMPUTING
Chapter 3: Understanding Cloud Computing
3.1 Origins and Influences
A Brief History
Definitions
Business Drivers
Cost Reduction
Business Agility
Technology Innovations
Clustering
Grid Computing
Capacity Planning
Virtualization
Containerization
Serverless Environments
3.2 Basic Concepts and Terminology
Cloud
Container
IT Resource
On Premises
Cloud Consumers and Cloud Providers
Scaling
Horizontal Scaling
Vertical Scaling
Cloud Service
Cloud Service Consumer
3.3 Goals and Benefits
Increased Responsiveness
Reduced Investments and Proportional Costs
Increased Scalability
Increased Availability and Reliability
3.4 Risks and Challenges
Increased Vulnerability Due to Overlapping Trust Boundaries
Increased Vulnerability Due to Shared Security Responsibility
Increased Exposure to Cyber Threats
Reduced Operational Governance Control
Limited Portability Between Cloud Providers
Multiregional Compliance and Legal Issues
Cost Overruns
Chapter 4: Fundamental Concepts and Models
4.1 Roles and Boundaries
Cloud Provider
Cloud Consumer
Cloud Broker
Cloud Service Owner
Cloud Resource Administrator
Additional Roles
Organizational Boundary
Trust Boundary
4.2 Cloud Characteristics
On-Demand Usage
Ubiquitous Access
Multitenancy (and Resource Pooling)
Elasticity
Measured Usage
Resiliency
4.3 Cloud Delivery Models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Comparing Cloud Delivery Models
Combining Cloud Delivery Models
IaaS + PaaS
IaaS + PaaS + SaaS
Cloud Delivery Submodels
4.4 Cloud Deployment Models
Public Clouds
Private Clouds
Multiclouds
Hybrid Clouds
Chapter 5: Cloud-Enabling Technology
5.1 Networks and Internet Architecture
Internet Service Providers (ISPs)
Connectionless Packet Switching (Datagram Networks)
Router-Based Interconnectivity
Physical Network
Transport Layer Protocol
Application Layer Protocol
Technical and Business Considerations
Connectivity Issues
Network Bandwidth and Latency Issues
Wireless and Cellular
Cloud Carrier and Cloud Provider Selection
5.2 Cloud Data Center Technology
Virtualization
Standardization and Modularity
Autonomic Computing
Remote Operation and Management
High Availability
Security-Aware Design, Operation, and Management
Facilities
Computing Hardware
Storage Hardware
Network Hardware
Carrier and External Networks Interconnection
Web-Tier Load Balancing and Acceleration
LAN Fabric
SAN Fabric
NAS Gateways
Serverless Environments
NoSQL Clustering
Other Considerations
5.3 Modern Virtualization
Hardware Independence
Server Consolidation
Resource Replication
Operating System–Based Virtualization
Hardware-Based Virtualization
Containers and Application-Based Virtualization
Virtualization Management
Other Considerations
5.4 Multitenant Technology
5.5 Service Technology and Service APIs
REST Services
Web Services
Service Agents
Service Middleware
Web-Based RPC
5.6 Case Study Example
Chapter 6: Understanding Containerization
6.1 Origins and Influences
A Brief History
Containerization and Cloud Computing
6.2 Fundamental Virtualization and Containerization
Operating System Basics
Virtualization Basics
Physical Servers
Virtual Servers
Hypervisors
Virtualization Types
Containerization Basics
Containers
Container Images
Container Engines
Pods
Hosts
Host Clusters
Host Networks and Overlay Networks
Virtualization and Containerization
Containerization on Physical Servers
Containerization on Virtual Servers
Containerization Benefits
Containerization Risks and Challenges
6.3 Understanding Containers
Container Hosting
Containers and Pods
Container Instances and Clusters
Container Package Management
Container Orchestration
Container Package Manager vs. Container Orchestrator
Container Networks
Container Network Scope
Container Network Addresses
Rich Containers
Other Common Container Characteristics
6.4 Understanding Container Images
Container Image Types and Roles
Container Image Immutability
Container Image Abstraction
Operating System Kernel Abstraction
Operating System Abstraction Beyond the Kernel
Container Build Files
Container Image Layers
How Customized Container Images Are Created
6.5 Multi-Container Types
Sidecar Container
Adapter Container
Ambassador Container
Using Multi-Containers Together
6.6 Case Study Example
Chapter 7: Understanding Cloud Security and Cybersecurity
7.1 Basic Security Terminology
Confidentiality
Integrity
Availability
Authenticity
Security Controls
Security Mechanisms
Security Policies
7.2 Basic Threat Terminology
Risk
Vulnerability
Exploit
Zero-Day Vulnerability
Security Breach
Data Breach
Data Leak
Threat (or Cyber Threat)
Attack (or Cyber Attack)
Attacker and Intruder
Attack Vector and Surface
7.3 Threat Agents
Anonymous Attacker
Malicious Service Agent
Trusted Attacker
Malicious Insider
7.4 Common Threats
Traffic Eavesdropping
Malicious Intermediary
Denial of Service
Insufficient Authorization
Virtualization Attack
Overlapping Trust Boundaries
Containerization Attack
Malware
Insider Threat
Social Engineering and Phishing
Botnet
Privilege Escalation
Brute Force
Remote Code Execution
SQL Injection
Tunneling
Advanced Persistent Threat (APT)
7.5 Case Study Example
7.6 Additional Considerations
Flawed Implementations
Security Policy Disparity
Contracts
Risk Management
7.7 Case Study Example
PART II: CLOUD COMPUTING MECHANISMS
Chapter 8: Cloud Infrastructure Mechanisms
8.1 Logical Network Perimeter
Case Study Example
8.2 Virtual Server
Case Study Example
8.3 Hypervisor
Case Study Example
8.4 Cloud Storage Device
Cloud Storage Levels
Network Storage Interfaces
Object Storage Interfaces
Database Storage Interfaces
Relational Data Storage
Non-Relational Data Storage
Case Study Example
8.5 Cloud Usage Monitor
Monitoring Agent
Resource Agent
Polling Agent
Case Study Example
8.6 Resource Replication
Case Study Example
8.7 Ready-Made Environment
Case Study Example
8.8 Container
Chapter 9: Specialized Cloud Mechanisms
9.1 Automated Scaling Listener
Case Study Example
9.2 Load Balancer
Case Study Example
9.3 SLA Monitor
Case Study Example
SLA Monitor Polling Agent
SLA Monitoring Agent
9.4 Pay-Per-Use Monitor
Case Study Example
9.5 Audit Monitor
Case Study Example
9.6 Failover System
Active–Active
Active–Passive
Case Study Example
9.7 Resource Cluster
Case Study Example
9.8 Multi-Device Broker
Case Study Example
9.9 State Management Database
Case Study Example
Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms
10.1 Encryption
Symmetric Encryption
Asymmetric Encryption
Case Study Example
10.2 Hashing
Case Study Example
10.3 Digital Signature
Case Study Example
10.4 Cloud-Based Security Groups
Case Study Example
10.5 Public Key Infrastructure (PKI) System
Case Study Example
10.6 Single Sign-On (SSO) System
Case Study Example
10.7 Hardened Virtual Server Image
Case Study Example
10.8 Firewall
Case Study Example
10.9 Virtual Private Network (VPN)
Case Study Example
10.10 Biometric Scanner
Case Study Example
10.11 Multi-Factor Authentication (MFA) System
Case Study Example
10.12 Identity and Access Management (IAM) System
Case Study Example
10.13 Intrusion Detection System (IDS)
Case Study Example
10.14 Penetration Testing Tool
Case Study Example
10.15 User Behavior Analytics (UBA) System
Case Study Example
10.16 Third-Party Software Update Utility
Case Study Example
10.17 Network Intrusion Monitor
Case Study Example
10.18 Authentication Log Monitor
Case Study Example
10.19 VPN Monitor
Case Study Example
10.20 Additional Cloud Security Access-Oriented Practices and Technologies
Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms
11.1 Digital Virus Scanning and Decryption System
Generic Decryption
Digital Immune System
Case Study Example
11.2 Malicious Code Analysis System
Case Study Example
11.3 Data Loss Prevention (DLP) System
Case Study Example
11.4 Trusted Platform Module (TPM)
Case Study Example
11.5 Data Backup and Recovery System
Case Study Example
11.6 Activity Log Monitor
Case Study Example
11.7 Traffic Monitor
Case Study Example
11.8 Data Loss Protection Monitor
Case Study Example
Chapter 12: Cloud Management Mechanisms
12.1 Remote Administration System
Case Study Example
12.2 Resource Management System
Case Study Example
12.3 SLA Management System
Case Study Example
12.4 Billing Management System
Case Study Example
PART III: CLOUD COMPUTING ARCHITECTURE
Chapter 13: Fundamental Cloud Architectures
13.1 Workload Distribution Architecture
13.2 Resource Pooling Architecture
13.3 Dynamic Scalability Architecture
13.4 Elastic Resource Capacity Architecture
13.5 Service Load Balancing Architecture
13.6 Cloud Bursting Architecture
13.7 Elastic Disk Provisioning Architecture
13.8 Redundant Storage Architecture
13.9 Multicloud Architecture
13.10 Case Study Example
Chapter 14: Advanced Cloud Architectures
14.1 Hypervisor Clustering Architecture
14.2 Virtual Server Clustering Architecture
14.3 Load-Balanced Virtual Server Instances Architecture
14.4 Nondisruptive Service Relocation Architecture
14.5 Zero Downtime Architecture
14.6 Cloud Balancing Architecture
14.7 Resilient Disaster Recovery Architecture
14.8 Distributed Data Sovereignty Architecture
14.9 Resource Reservation Architecture
14.10 Dynamic Failure Detection and Recovery Architecture
14.11 Rapid Provisioning Architecture
14.12 Storage Workload Management Architecture
14.13 Virtual Private Cloud Architecture
14.14 Case Study Example
Chapter 15: Specialized Cloud Architectures
15.1 Direct I/O Access Architecture
15.2 Direct LUN Access Architecture
15.3 Dynamic Data Normalization Architecture
15.4 Elastic Network Capacity Architecture
15.5 Cross-Storage Device Vertical Tiering Architecture
15.6 Intra-Storage Device Vertical Data Tiering Architecture
15.7 Load-Balanced Virtual Switches Architecture
15.8 Multipath Resource Access Architecture
15.9 Persistent Virtual Network Configuration Architecture
15.10 Redundant Physical Connection for Virtual Servers Architecture
15.11 Storage Maintenance Window Architecture
15.12 Edge Computing Architecture
15.13 Fog Computing Architecture
15.14 Virtual Data Abstraction Architecture
15.15 Metacloud Architecture
15.16 Federated Cloud Application Architecture
PART IV: WORKING WITH CLOUDS
Chapter 16: Cloud Delivery Model Considerations
16.1 Cloud Delivery Models: The Cloud Provider Perspective
Building IaaS Environments
Data Centers
Scalability and Reliability
Monitoring
Security
Equipping PaaS Environments
Scalability and Reliability
Monitoring
Security
Optimizing SaaS Environments
Security
16.2 Cloud Delivery Models: The Cloud Consumer Perspective
Working with IaaS Environments
IT Resource Provisioning Considerations
Working with PaaS Environments
IT Resource Provisioning Considerations
Working with SaaS Services
16.3 Case Study Example
Chapter 17: Cost Metrics and Pricing Models
17.1 Business Cost Metrics
Up-Front and Ongoing Costs
Additional Costs
Case Study Example
Product Catalog Browser
On-Premises Up-Front Costs
On-Premises Ongoing Costs
Cloud-Based Up-Front Costs
Cloud-Based Ongoing Costs
17.2 Cloud Usage Cost Metrics
Network Usage
Inbound Network Usage Metric
Outbound Network Usage Metric
Intra-Cloud WAN Usage Metric
Server Usage
On-Demand Virtual Machine Instance Allocation Metric
Reserved Virtual Machine Instance Allocation Metric
Cloud Storage Device Usage
On-Demand Storage Space Allocation Metric
I/O Data Transferred Metric
Cloud Service Usage
Application Subscription Duration Metric
Number of Nominated Users Metric
Number of Transactions Users Metric
17.3 Cost Management Considerations
Pricing Models
Multicloud Cost Management
Additional Considerations
Case Study Example
Virtual Server On-Demand Instance Allocation
Virtual Server Reserved Instance Allocation
Cloud Storage Device
WAN Traffic
Chapter 18: Service Quality Metrics and SLAs
18.1 Service Quality Metrics
Service Availability Metrics
Availability Rate Metric
Outage Duration Metric
Service Reliability Metrics
Mean Time Between Failures (MTBF) Metric
Reliability Rate Metric
Service Performance Metrics
Network Capacity Metric
Storage Device Capacity Metric
Server Capacity Metric
Web Application Capacity Metric
Instance Starting Time Metric
Response Time Metric
Completion Time Metric
Service Scalability Metrics
Storage Scalability (Horizontal) Metric
Server Scalability (Horizontal) Metric
Server Scalability (Vertical) Metric
Service Resiliency Metrics
Mean Time to Switchover (MTSO) Metric
Mean Time to System Recovery (MTSR) Metric
18.2 Case Study Example
18.3 SLA Guidelines
18.4 Case Study Example
Scope and Applicability
Service Quality Guarantees
Definitions
Usage of Financial Credits
SLA Exclusions
PART V: APPENDICES
Appendix A: Case Study Conclusions
A.1 ATN
A.2 DTGOV
A.3 Innovartus
Appendix B: Common Containerization Technologies
B.1 Docker
Docker Server
Docker Client
Docker Registry
Docker Objects
Docker Swarm (Container Orchestrator)
B.2 Kubernetes
Kubernetes Node (Host)
Kubernetes Pod
Kubelet
Kube-Proxy
Container Runtime (Container Engine)
Cluster
Kubernetes Control Plane
9780138052256 TOC 7/17/2023