Cloud Computing
Total Page:16
File Type:pdf, Size:1020Kb
Cloud Computing K10347_FM.indd 1 7/8/09 4:20:38 PM K10347_FM.indd 2 7/8/09 4:20:38 PM Cloud Computing Implementation, Management, and Security John W. Rittinghouse James F. Ransome Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business K10347_FM.indd 3 7/8/09 4:20:38 PM CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2010 by Taylor and Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-0680-7 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a pho- tocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com K10347_FM.indd 4 7/8/09 4:20:38 PM RittinghouseTOC.fm Page v Monday, May 25, 2009 6:53 PM Contents Foreword xiii Preface xix Introduction xxv What Is the Cloud? xxvi The Emergence of Cloud Computing xxvi The Global Nature of the Cloud xxvii Cloud-Based Service Offerings xxviii Grid Computing or Cloud Computing? xxxi Is the Cloud Model Reliable? xxxi Benefits of Using a Cloud Model xxxii What About Legal Issues When Using Cloud Models? xxxii What Are the Key Characteristics of Cloud Computing? xxxiv Challenges for the Cloud xxxvi Chapter 1 The Evolution of Cloud Computing 1 1.1 Chapter Overview 1 1.2 Hardware Evolution 2 1.2.1 First-Generation Computers 3 1.2.2 Second-Generation Computers 4 1.2.3 Third-Generation Computers 5 1.2.4 Fourth-Generation Computers 6 1.3 Internet Software Evolution 7 1.3.1 Establishing a Common Protocol for the Internet 12 1.3.2 Evolution of Ipv6 13 v RittinghouseTOC.fm Page vi Monday, May 25, 2009 6:53 PM vi Cloud Computing 1.3.3 Finding a Common Method to Communicate Using the Internet Protocol 13 1.3.4 Building a Common Interface to the Internet 15 1.3.5 The Appearance of Cloud Formations—From One Computer to a Grid of Many 20 1.4 Server Virtualization 24 1.4.1 Parallel Processing 25 1.4.2 Vector Processing 26 1.4.3 Symmetric Multiprocessing Systems 26 1.4.4 Massively Parallel Processing Systems 27 1.5 Chapter Summary 28 Chapter 2 Web Services Delivered from the Cloud 29 2.1 Chapter Overview 29 2.2 Communication-as-a-Service (CaaS) 30 2.2.1 Advantages of CaaS 31 2.2.2 Fully Integrated, Enterprise-Class Unified Communications 32 2.3 Infrastructure-as-a-Service (IaaS) 34 2.3.1 Modern On-Demand Computing 36 2.3.2 Amazon’s Elastic Cloud 37 2.3.3 Amazon EC2 Service Characteristics 38 2.3.4 Mosso (Rackspace) 42 2.4 Monitoring-as-a-Service (MaaS) 44 2.4.1 Protection Against Internal and External Threats 45 2.4.2 Delivering Business Value 47 2.4.3 Real-Time Log Monitoring Enables Compliance 48 2.5 Platform-as-a-Service (PaaS) 48 2.5.1 The Traditional On-Premises Model 49 2.5.2 The New Cloud Model 49 2.5.3 Key Characteristics of PaaS 49 2.6 Software-as-a-Service (SaaS) 50 2.6.1 SaaS Implementation Issues 51 2.6.2 Key Characteristics of SaaS 52 2.6.3 Benefits of the SaaS Model 53 2.7 Chapter Summary 54 RittinghouseTOC.fm Page vii Monday, May 25, 2009 6:53 PM Contents vii Chapter 3 Building Cloud Networks 57 3.1 Chapter Overview 57 3.2 The Evolution from the MSP Model to Cloud Computing and Software-as-a-Service 59 3.2.1 From Single-Purpose Architectures to Multipurpose Architectures 60 3.2.2 Data Center Virtualization 61 3.3 The Cloud Data Center 62 3.4 Collaboration 62 3.4.1 Why Collaboration? 65 3.5 Service-Oriented Architectures as a Step Toward Cloud Computing 70 3.6 Basic Approach to a Data Center-Based SOA 72 3.6.1 Planning for Capacity 73 3.6.2 Planning for Availability 73 3.6.3 Planning for SOA Security 74 3.7 The Role of Open Source Software in Data Centers 75 3.8 Where Open Source Software Is Used 77 3.8.1 Web Presence 78 3.8.2 Database Tier 81 3.8.3 Application Tier 83 3.8.4 Systems and Network Management Tier 87 3.9 Chapter Summary 101 Chapter 4 Virtualization Practicum 103 4.1 Chapter Overview 103 4.2 Downloading Sun xVM VirtualBox 104 4.3 Installing Sun xVM VirtualBox 106 4.4 Adding a Guest Operating System to VirtualBox 112 4.5 Downloading FreeDOS as a Guest OS 112 4.6 Downloading the 7-Zip Archive Tool 114 4.7 Adding a Guest OS to Sun xVM VirtualBox 115 4.8 Chapter Summary 127 Chapter 5 Federation, Presence, Identity, and Privacy in the Cloud 129 5.1 Chapter Overview 129 5.2 Federation in the Cloud 129 5.2.1 Four Levels of Federation 132 RittinghouseTOC.fm Page viii Monday, May 25, 2009 6:53 PM viii Cloud Computing 5.2.2 How Encrypted Federation Differs from Trusted Federation 134 5.2.3 Federated Services and Applications 134 5.2.4 Protecting and Controlling Federated Communication 135 5.2.5 The Future of Federation 136 5.3 Presence in the Cloud 136 5.3.1 Presence Protocols 137 5.3.2 Leveraging Presence 138 5.3.3 Presence Enabled 139 5.3.4 The Future of Presence 139 5.3.5 The Interrelation of Identity, Presence, and Location in the Cloud 140 5.3.6 Federated Identity Management 140 5.3.7 Cloud and SaaS Identity Management 141 5.3.8 Federating Identity 143 5.3.9 Claims-Based Solutions 144 5.3.10 Identity-as-a-Service (IaaS) 144 5.3.11 Compliance-as-a-Service (CaaS) 145 5.3.12 The Future of Identity in the Cloud 146 5.4 Privacy and Its Relation to Cloud-Based Information Systems 147 5.4.1 Privacy Risks and the Cloud 149 5.4.2 Protecting Privacy Information 150 5.4.3 The Future of Privacy in the Cloud 151 5.5 Chapter Summary 152 Chapter 6 Security in the Cloud 153 6.1 Chapter Overview 153 6.2 Cloud Security Challenges 158 6.3 Software-as-a-Service Security 162 6.3.1 Security Management (People) 164 6.3.2 Security Governance 165 6.3.3 Risk Management 165 6.3.4 Risk Assessment 165 6.3.5 Security Portfolio Management 166 6.3.6 Security Awareness 166 6.3.7 Education and Training 167 6.3.8 Policies, Standards, and Guidelines 167 6.3.9 Secure Software Development Life Cycle (SecSDLC) 168 RittinghouseTOC.fm Page ix Monday, May 25, 2009 6:53 PM Contents ix 6.3.10 Security Monitoring and Incident Response 169 6.3.11 Third-Party Risk Management 169 6.3.12 Requests for Information and Sales Support 169 6.3.13 Business Continuity Plan 170 6.3.14 Forensics 170 6.3.15 Security Architecture Design 172 6.3.16 Vulnerability Assessment 173 6.3.17 Password Assurance Testing 173 6.3.18 Logging for Compliance and Security Investigations 173 6.3.19 Security Images 173 6.3.20 Data Privacy 174 6.3.21 Data Governance 175 6.3.22 Data Security 175 6.3.23 Application Security 176 6.3.24 Virtual Machine Security 177 6.3.25 Identity Access Management (IAM) 177 6.3.26 Change Management 178 6.3.27 Physical Security 178 6.3.28 Business Continuity and Disaster Recovery 179 6.3.29 The Business Continuity Plan 180 6.4 Is Security-as-a-Service the New MSSP? 181 6.5 Chapter Summary 182 Chapter 7 Common Standards in Cloud Computing 183 7.1 Chapter Overview 183 7.2 The Open Cloud Consortium 183 7.3 The Distributed Management Task Force 185 7.3.1 Open Virtualization Format 186 7.4 Standards for Application Developers 187 7.4.1 Browsers (Ajax) 188 7.4.2 Data (XML, JSON) 189 7.4.3 Solution Stacks (LAMP and LAPP) 192 7.5 Standards for Messaging 193 7.5.1 Simple Message Transfer Protocol (SMTP) 193 7.5.2 Post Office Protocol (POP) 194 RittinghouseTOC.fm Page x Monday, May 25, 2009 6:53 PM x Cloud Computing 7.5.3 Internet Messaging Access Protocol (IMAP) 194 7.5.4 Syndication (Atom, Atom Publishing Protocol, and RSS) 194 7.5.5 Communications (HTTP, SIMPLE, and XMPP) 202 7.6 Standards for Security 205 7.6.1 Security (SAML OAuth, OpenID, SSL/TLS) 205 7.7 Chapter Summary 212 Chapter 8 End-User Access to Cloud Computing 213 8.1 Chapter Overview 213 8.2 YouTube 214 8.3 YouTube API Overview 215 8.3.1 Widgets 216 8.3.2 YouTube Player APIs 217 8.3.3 The YouTube Custom Player 218 8.3.4 YouTube Data API 218 8.4 Zimbra 219 8.4.1 Zimbra Collaboration Suite (ZCS) 221 8.5 Facebook 221 8.5.1 Facebook Development 223 8.6 Zoho