• Sign In / Register
  • Help
  • Basket0
The books you love, the emails you want
Time is running out, opt in before 25 May or you'll stop hearing from us
Yes Please
Resource Optimization and Security for Cloud Services (Hardback)
  • Resource Optimization and Security for Cloud Services (Hardback)
zoom

Resource Optimization and Security for Cloud Services (Hardback)

(author)
£94.50
Hardback 206 Pages / Published: 28/01/2014
  • We can order this

Usually despatched within 1 week

  • This item has been added to your basket

Check Marketplace availability

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Effective and accurate numerical solutions for the calculation of the percentile response time in single-class and multi-class queueing networks are obtained. Then, the numerical solution is incorporated in a resource allocation problem. Specifically, the authors present an approach for the resource optimization that minimizes the total cost of computer resources required while preserving a given percentile of the response time. In the second part, the approach is extended to consider trustworthiness, service availability, and the percentile of response time in Web services. These QoS metrics are clearly defined and their quantitative analysis provided. The authors then take into account these QoS metrics in a trust-based resource allocation problem in which a set of cloud computing resources is used by a service provider to host a typical Web services application for single-class customer services and multipleclass customer services respectively. Finally, in the third part of the book a thorough performance evaluation of two notable public key cryptography-based authentication techniques; Public-Key Cross Realm Authentication in Kerberos (PKCROSS) and Public Key Utilizing Tickets for Application Servers (PKTAPP, a.k.a. KX.509/KCA); is given, in terms of computational and communication times. The authors then demonstrate their performance difference using queuing networks. PKTAPP has been proposed to address the scalability issue of PKCROSS. However, their in-depth analysis of these two techniques shows that PKTAPP does not perform better than PKCROSS in a large-scale system. Thus, they propose a new public key cryptography-based group authentication technique. The performance analysis demonstrates that the new technique can scale better than PKCORSS and PKTAPP.

Publisher: ISTE Ltd and John Wiley & Sons Inc
ISBN: 9781848215993
Number of pages: 206
Weight: 514 g
Dimensions: 235 x 163 x 22 mm

You may also be interested in...

Cyber Survival Manual
Added to basket
£22.50
Paperback
Cybersecurity and Cyberwar
Added to basket
Cyberphobia
Added to basket
£9.99
Paperback
Intercept
Added to basket
£8.99
Paperback
EU GDPR
Added to basket
Everyday Cryptography
Added to basket
DarkMarket
Added to basket
£10.99
Paperback
The Cyber Effect
Added to basket
£10.99
Paperback
The Art of Deception
Added to basket
Helping Kids with Coding For Dummies
Added to basket
The Ultimate GDPR Practitioner Guide
Added to basket
The Truth Machine
Added to basket
Blockchain Basics
Added to basket
Understanding Cryptography
Added to basket
Dark Territory
Added to basket
£12.99
Paperback

Reviews

Please sign in to write a review

Your review has been submitted successfully.