edited by Roy H. Campbell, Charles A. Kamhoua, Kevin A. Kwiat.
First edition.
Hoboken, NJ :
IEEE Computer Society, Inc./Wiley,
2018.
1 online resource
Includes bibliographical references and index.
Assured Cloud Computing; Table of Contents; Preface; Editors' Biographies; List of Contributors; Chapter 1: Introduction; 1.1 Introduction; 1.1.1 Mission-Critical Cloud Solutions for the Military; 1.2 Overview of the Book; References; Chapter 2: Survivability: Design, Formal Modeling, and Validation of Cloud Storage Systems Using Maude; 2.1 Introduction; 2.1.1 State of the Art; 2.1.2 Vision: Formal Methods for Cloud Storage Systems; 2.1.3 The Rewriting Logic Framework; 2.1.4 Summary: Using Formal Methods on Cloud Storage Systems; 2.2 Apache Cassandra.
2.3 Formalizing, Analyzing, and Extending Google's Megastore2.3.1 Specifying Megastore; 2.3.2 Analyzing Megastore; 2.3.2.1 Megastore-CGC; 2.4 RAMP Transaction Systems; 2.5 Group Key Management via ZooKeeper; 2.5.1 Zookeeper Background; 2.5.2 System Design; 2.5.3 Maude Model; 2.5.4 Analysis and Discussion; 2.6 How Amazon Web Services Uses Formal Methods; 2.6.1 Use of Formal Methods; 2.6.2 Outcomes and Experiences; 2.6.3 Limitations; 2.7 Related Work; 2.8 Concluding Remarks; 2.8.1 The Future; Acknowledgments; References.
4.5.1 Hypervisor Introspection4.5.1.1 VMI Monitor; 4.5.1.2 VM Suspend Side-Channel; 4.5.1.3 Limitations of Hypervisor Introspection; 4.5.2 Evading VMI with Hypervisor Introspection; 4.5.2.1 Insider Attack Model and Assumptions; 4.5.2.2 Large File Transfer; 4.5.3 Defenses against Hypervisor Introspection; 4.5.3.1 Introducing Noise to VM Clocks; 4.5.3.2 Scheduler-Based Defenses; 4.5.3.3 Randomized Monitoring Interval; 4.5.4 Summary; 4.6 Identifying Compromised Users in Shared Computing Infrastructures; 4.6.1 Target System and Security Data; 4.6.1.1 Data and Alerts.
0
8
8
Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as newer research findings on topics including R-Storm, and RAMP transactions - Addresses assured cloud computing concerns such as game theory, stream processing, storage, algorithms, workflow, scheduling, access control, formal analysis of safety, and streaming Marketing Description: IEEE Computer Society, the IEEE Reliability Society, and the IEEE Systems, Man, and Cybernetics Society--