Скачиваний:
50
Добавлен:
20.06.2019
Размер:
50.48 Mб
Скачать

Index

A

Abstraction, 12, 26, 41, 48, 81, 84, 94, 99, 129, 133, 134, 136–138, 143, 150–152, 171, 181, 263, 282

Agency cloud, 273, 274, 276, 280, 285, 286

Amazon, 4, 5, 10, 11, 13, 21–23, 26, 30, 33, 35, 38, 39, 41, 43, 58, 64, 66, 74, 78, 79, 81, 83, 95, 132, 145, 160, 164, 165, 167–170, 172–174, 176–178, 182, 185, 186, 191–193, 196, 197, 199, 200, 203, 211, 213–215, 220, 221, 225–229, 234, 261, 267, 268, 274, 276, 282, 286, 299–301, 311, 313–315, 318, 319, 322, 328, 357, 358, 363–365, 369, 370

Amazon elastic compute cloud (EC2, Amazon elastic cloud computing), 5, 6, 10, 21–23, 26, 31, 33–35, 37, 39–41, 58, 64, 66, 79, 95, 132, 146, 164–170, 172–177, 182, 185, 186, 191–193, 196, 197, 199, 200, 203, 211, 213–215, 220, 224–229, 231–235, 261, 267, 274, 282, 286, 300, 301, 311, 313, 357, 358, 363, 365, 366, 369–371

Amazon Elastic MapReduce, 35

Amazon S3, 22, 30, 41, 43, 74 Amazon S3 buckets, 43

Amazon Web Services (AWS), 11, 23, 33–35, 41, 43, 79, 81, 83, 178, 200, 226, 228, 286, 300, 301, 322, 363, 364, 369, 370

Apache, 15, 38, 114, 265 Apache axis, 38

Apache hadoop, 114 Application-defined SLAs, 33 Application provisioning, 31, 63, 196,

212–214

ASKALON, 180–182, 188, 189 Auditing issues, 281

Authentication, 24, 32, 35, 38, 40, 57, 68, 82, 94, 99, 101, 107, 136, 138, 140, 187, 188, 227, 246–248, 291, 296, 298, 300, 301, 306, 307, 311–313, 317–321, 339, 344

Automatic scaling, 37, 41, 338

B

Backups, 5, 26, 32, 34, 37, 116–118, 120, 121, 123, 124, 130, 282, 283, 292, 294, 340, 351

Bandwidth, 26, 30, 73, 108, 128, 130–135, 137, 139–143, 155, 203, 261, 338, 346, 348, 357, 362, 363

Benchmarks, 164–167, 191, 192 BigTable, 5, 41

Broadcasting, 328–334, 336–338, 340 Business as a service (BaaS), 23 Business continuity and disaster recovery

issues, 282

Business model, 13, 15, 42, 50–53, 58, 59, 66, 70, 100, 109, 150, 151, 267, 328

C

California Security Breach Information Act, 280

Certification, 35, 41, 101, 107, 251, 252, 280, 283

CESG information assurance, 286

Cloud architectures, 22, 24–26, 30, 42, 132, 138, 143, 305–324

Cloud architecture virtualization, 25, 132, 308, 311–313, 315, 317–319, 321, 322, 324

Cloud billing, 30

Cloud bursting, 164, 175, 176, 178 Cloud-centric regulatory compliance, 41

373

374

Cloud computing

communications, 14–16, 29, 35, 37, 41, 56, 67, 71, 95, 103, 119, 128, 130, 131, 134, 136, 137, 143, 159, 163, 166–174, 176–178, 188, 196, 197, 200, 203, 228, 245, 253, 259, 269, 291–294, 298, 300, 306–311, 313, 317, 318, 357

deployment, 5, 6, 9–11, 16, 29, 52, 67, 71, 79, 85, 86, 99, 105, 106, 122, 128, 164, 165, 167–171, 175, 178, 180–184, 186–188, 193, 196, 199, 213, 221–223, 226, 249, 273, 275, 281, 284, 285, 287, 306–316, 318–320, 323, 324, 329, 337–340, 346–349

ecosystems, 21–44, 77, 80

outages, 7, 32, 33, 74, 81, 86, 196, 199 taxonomy, 22–32, 47–60

Cloud Computing Interoperability Forum (CCIF), 43, 80

Cloud delivery models, 22, 81, 273, 276, 284 CloudFS, 40

Cloud hosting, 30, 133, 197, 200 Cloudification, 21

Cloud infrastructure manager (CIM), 7, 11, 17 Cloud layers, 59, 67, 81, 94–95, 100, 103,

105, 128, 129, 132, 137, 138, 143, 150, 151, 165, 198–199, 211, 212, 306

Cloud middleware, 132, 133, 150, 151, 178 Cloud operating system (COS), 129, 132,

135–138

Cloud portability, 40, 261 Cloud programming models, 41

Cloud provisioning, 192, 195–216 Cloud resource provisioning, 28

Cloud security, 31, 74, 82, 83, 86, 242, 260, 264, 275, 280, 284–287, 290, 291, 300, 301, 305, 352

Cloud security alliance (CSA), 74, 82, 83, 86, 242, 260, 264, 280, 290, 301, 305

Cloud security framework, 285, 287

Cloud security relationship framework, 275, 284–286

Cloud security relationship model, 275 Cloud seeding, 164, 176–178

Cloud states, 184, 205, 293

Cloud storage, 35, 37, 40, 84, 105, 192, 263, 264, 298, 322, 351

Cloud Storage Initiative, 84

Cloud vendors, 23, 30, 42, 80, 281, 286, 343–346, 351–359

Cluster, 7, 10, 13, 22, 36, 39, 40, 55, 63, 95, 106, 114, 132, 146–148, 150, 152–154, 157, 160, 163–178, 180, 192, 200, 205, 219–223, 227, 228, 231, 232, 234, 313–315, 336, 344, 363, 366

Index

Collaboration, 32, 43, 71, 72, 87, 103, 130, 222, 264, 265, 267, 269

Collateralized debt obligations (CDO), 364 Commodity computers, 13, 142,

221, 315

Community cloud, 273, 274, 285, 286 Compliance, 41, 43, 77, 78, 81–83, 85–87,

241–254, 258, 277, 279–281, 283, 286, 290, 292, 295, 296, 299, 347, 353

Computer-supported cooperative work (CSCW), 63–75

Computing infrastructure, 5, 9, 13, 33–35, 41, 104, 136, 137, 139, 172, 182, 220, 221, 235, 263, 356

Computing outages, 32

Condor, 148, 221, 222, 226, 363, 365, 366, 368–370

Confidential, 43, 73, 82, 99, 102, 103, 109, 186, 246, 257–269, 272, 276–279, 284–286, 291, 293, 307, 312, 320, 323, 344, 352

Control issues, 280

Control plane, 131, 134–137, 139, 143 Cross-application vulnerability exploits, 283 Cross-virtual machine (VM) exploits, 283

D

Dashboard, 10, 38, 79

Data-aware distributed computing, 46 Databases, 5, 31, 43, 50, 53, 59, 203,

261, 268, 354

Datacenter, 213, 246, 290, 292, 295, 300–302

[Data center, database, desktop] as a service (DaaS), 15, 23, 53, 58, 59

Data confidentiality, 73, 99, 102, 257–269, 277–279, 352

Data isolation, 81, 82 Data location, 279, 352 Data ownership, 81, 277

Data ownership and content disclosure, 277 Dataquest, 45

DDOS attacks, 31 Decryption, 24, 31, 316

Dedicated computing resources, 147, 148, 150, 152, 160

Defense Information Systems Agency (DISA) cloud, 274, 278, 286

Deploy, 5, 7, 10, 29, 41, 69, 129, 161, 164, 165, 167, 177, 182, 183, 196, 283, 286, 309, 318, 349

Deployment lifecycle, 29 Deployment monitoring, 29, 338 Deprovisioned, 27

Index

Desktop, 23, 26, 27, 56, 96, 129, 133, 138, 140, 146–148, 152, 154, 155, 160, 176, 267, 349

Desktop virtualization, 26 Digital identity, 42, 57 Digital media, 327–340

Disclosure, 28, 82, 277, 281, 322 Discovery, 15, 24, 27, 42, 86, 98, 99, 101,

104, 118–120, 122, 167, 181, 195–216, 222, 227, 281

Disk storage, 33, 344

Distributed computing, 14, 21, 48, 93, 94, 96, 129, 139, 143, 146, 165, 171, 222, 268, 272, 286, 316, 362, 365

Distributed hash table (DHT), 119, 199, 201–206, 208, 215

Distributed Management Task Force (DMTF), 9, 16, 43, 74, 80, 84, 88, 263, 264

Distributed provisioning, 323 Downtime, 6, 32, 33

Dynamic provisioning, 107, 143, 196

E

Economic scheduling (Budget scheduling), 224, 225, 229–234

Ecosystems, 21–44, 77, 80 Elastic IPs, 36, 37

Elastic MapReduce, 35

Elastic utility computing architecture linking your programs to useful systems (Eucalyptus), 10, 26, 33, 35, 39,

40, 58, 84, 95, 180, 182, 185, 186, 189, 192, 197, 200, 228, 232, 363, 365, 366, 368–370

Elastra, 6, 11, 26, 268

Embarassingly parallel computing, 166, 212 Emerging threats to cloud computing,

283–284

Encryption, 24, 31, 248, 292, 293, 313 Enomaly, 5, 10, 26, 33, 39, 40, 42 Enterprise cloud, 28, 31, 42 Enterprise cloud governance, 28 Enterprise Java Beans (EJB), 14 e-Research, 198

e-Science, 47–60, 138, 269, 328 ESXi, 28, 72

EU Directive on Data protection, 279 European “adequacy” standard, 279 Everything as a service (XaaS), 22, 23 Extraterritorial effect, 279

375

F

Fabric, 22, 23, 195–197, 199, 200, 206–210, 213, 215

Fabric controller, 41, 199, 200 Facebook, 13, 22, 31, 198, 339 Failover, 22, 27, 32–34, 37, 40, 314 Failure recovery, 7, 119, 120, 226

Fault tolerance, 12, 22, 32–34, 37, 40, 44, 69, 107, 156, 164, 168, 201, 216, 313, 314 Fault tolerant, 13, 37, 161, 181, 199, 344, 351

Federal offence, 28 Federated database, 42 Federated identification, 24 Federated identity, 31–32, 247

Flexiscale, 11, 23, 26, 32–35, 186 Forensic evidence, 281 Forrester, 23, 73, 258

Framework as a service (FaaS), 23

G

Gartner, 27, 81, 267

GCM Deployment (GCMD), 167–168, 170, 175, 178

Gigaom, 45, 360

Gigaspaces, 26, 33, 35–38, 41 Globus, 10, 39, 40, 67, 99, 168, 185,

221–223, 227 Glusterfs, 39 Gmail, 4, 32, 311

Gogrid, 11, 26, 30, 33–35, 80, 185, 186, 191, 197, 200, 265

Gogrid’s prepaid cloud hosting, 30

Google, 4–6, 12, 15, 17, 21–23, 25, 31–33, 36, 38, 41, 43, 64, 66, 69, 74, 75, 79, 96, 108, 114, 115, 124, 145, 164, 197, 199, 200, 228, 268, 274, 276, 311, 339, 348, 358, 362

Google AppEngine (GAE), 23, 25, 32, 33, 36–38, 41–43, 79, 83, 164

Google Apps, 32, 274, 276, 362 Gossip protocol, 32

Governance, 21, 23, 24, 28–29, 31, 77, 78, 85–87, 242, 253, 290, 307, 324

GQL, 43 Greener, 28

Grid, 9, 11, 16, 27, 34, 37, 40, 41, 43, 47, 48, 55, 57, 63–75, 80, 93, 95, 97–99, 104, 106, 107, 116, 128, 129, 132, 137, 146–148, 150–152, 154, 155, 157, 160, 163–193, 207, 219–235, 257, 261–262, 268, 269, 327, 328, 330, 361–371

Grid architecture, 34, 104

376

Grid computing, 63–67, 70, 72, 75, 93, 128, 129, 163, 179, 180, 221, 261

Grid economics, 364

Grid forum, 9, 43, 74, 80, 261–262 GridFTP, 40, 67, 331

Grid proxies, 40 Grudin’s inequality, 71

H

Hadoop, 13, 22, 43, 114, 116, 138, 147, 160, 199

Hadoop distributed file system (HDFS), 13 Hardware architectures, 41

Hardware as a Service (HaaS), 23, 25, 26, 59, 95, 272

Hardware infrastructure, 22, 28 Hardware platform, 22, 63, 299, 366 Hardware platform infrastructure, 22 Hardware virtualization, 8, 25, 34, 180 Heterogeneous, 28, 55, 66, 71, 94, 98,

109, 147, 155, 165, 167, 169–171, 176–177, 189, 306, 309

Hibernate, 39, 297 Hierarchical SPMD, 171–173

High performance computing (HPC), 43, 56, 58, 59, 65, 70, 163, 165, 171–174, 178, 204, 221, 363

High throughput computing (HTC), 221, 222, 228, 235

High throughput science (HTS), 219–235 Hive, 22

Homogeneous, 5, 28, 66, 94, 98, 102, 147, 151, 272, 286

Horizontal scalability, 27, 37, 309 Host-based software, 27

Hosted private cloud, 35, 285, 349 Hosted provider, 23

Hosted virtual desktop, 27

Hosting, 6, 11, 25, 30, 39, 103, 132–134, 140, 164, 179, 195–197, 200, 201, 203, 204, 210–212, 245, 246, 268, 272, 273, 312, 329, 343, 352, 353, 357

Hybrid cloud, 11, 26, 42, 81, 98, 1 45–147, 160, 164, 201, 228, 273, 274, 286, 287

Hybrid cloud architecture, 42 Hype, 21, 44, 64, 310 Hyper-V, 8, 9, 28, 36, 72

Hypervisors, 7–9, 28, 34, 36, 39, 67, 95, 101, 102, 106, 108, 293, 294, 311

Index

I

IBM, 6, 15, 23, 25, 58, 64, 66, 79, 84, 95, 98, 145, 199, 265, 267, 310, 323, 348, 363, 365

IDC, 30, 73, 77

Identity, 31–32, 42, 57, 82, 103, 155, 247, 291, 298, 306–308, 310, 316, 318, 320, 321, 323

Identity verification, 42

Infrastructure as a service (IaaS), 4, 7, 11, 15, 23, 26, 34, 39, 42, 52, 53, 58, 66, 67, 69, 70, 73, 74, 79–81, 84–86, 95,

164, 169, 170, 182, 196, 198, 199, 203, 225, 226, 247, 248, 262, 269, 272, 273, 276, 279, 284, 285, 311–313, 321, 344, 345, 355–359

Instance types, 182, 184–186, 203, 226, 365, 366

Interface description language (IDL), 14, 15 Interoperability, 9, 15, 22, 24, 28–29, 35, 38, 40, 42, 43, 71, 77–81, 87, 97, 99–101, 104, 107, 109, 221–223, 252, 257–269,

280, 307 Inter-processor exploits, 283 ISO 27002, 290–295, 301

J

Java runtime environment (JRE), 7, 78 JXTA, 118–120, 122, 123

K

KVM, 8, 26, 72

L

Latency, 41, 73, 137, 166, 174, 179, 191, 250, 308, 315, 319, 320, 346, 363

License, 25, 30, 177, 280

Load balancer, 27, 197, 199, 200, 314, 322 Load balancing, 22, 24, 27–28, 41, 42, 164,

195–216, 333

Localised and federated clouds, 272

M

MapReduce, 6, 12–13, 17, 22, 43, 113–125 Mapreduce programming framework,

17, 38, 114 Master-slave, 41, 114, 123 Master slave replication, 41 MCSP, 279, 283

Message forwarding, 169–170

Index

Metadata, 12, 42, 67, 84, 204, 216, 227, 245, 293, 323, 328, 334, 338–340

Metering, 25, 29, 30 Microsoft, 5, 14, 23, 25, 26, 32,

64, 66, 72, 83, 145, 175, 199, 200, 213, 264–267, 274, 286, 308, 363

Microsoft Azure, 23, 25, 32, 83, 95, 265, 267, 274, 286

Middleware, 65–70, 95, 97–99, 103, 129, 132, 133, 136–139, 147–152, 154, 156–159, 163–165, 167, 169, 171, 178, 180, 181, 185, 189, 198, 199, 221, 223, 225–229, 317, 344, 358

Multi Protocol Label Switching (MPLS), 134, 135, 139, 143, 287

Multitenancy, 41, 42, 356

Multitenant, 25, 42, 290 Multitenant architecture, 42 MySQL, 37, 40, 85

N

National IT industry promotion agency (NIPA), 44

Nebula, 33, 95, 138, 164, 225, 228 Netsuite, 25

Network transfer protocols, 363

Nimbus, 23, 33, 42, 58, 78, 79, 81, 83, 85, 95, 99, 164, 165, 185

Nimrod tool family, 219–235

NIPA. See National IT industry promotion agency

O

Object Management Group (OMG), 264 Off-site third-party provider, 26 On-demand self-service, 272

Online replication, 27

Open cloud computing interface (OCCI), 9, 74, 262–264

Open cloud consortium (OCC), 43, 74, 264 Open Cloud Manifesto, 35, 87

Open Grid Forum (OGF), 9, 43, 74, 261–264, 269

OpenNebula, 95, 138, 164, 225, 228 Openspaces, 37

Open Virtualization Format (OVF), 9, 57, 74, 80, 84, 85

Oracle, 25, 79, 363

Organization as a Service (OaaS), 23

377

Organization for the Advancement of Structured Information Standards (OASIS), 16, 42

Outages, 7, 32, 74, 81, 86

P

Parallel computing, 163, 221

Parameter sweep (Parameter study, Parametric modelling), 212, 222, 371

Pay-for-use on-demand distributed computing, 357

Peer to peer (P2P), 63, 114, 116–125, 203, 362 Performance evaluation, 114, 140–142,

173–174

Persistent, 41, 136, 154, 187, 293, 315, 363 PHP, 138, 264–266

PKI, 101, 107, 319

Platform as a Service (PaaS), 4, 23, 25, 33, 37, 38, 41–43, 52, 66, 67, 69, 73, 79, 81, 83–86, 95, 164, 196, 198, 199, 203, 211, 212, 225, 226, 247, 268, 276, 284, 285, 311, 344, 345, 355–359

Platform infrastructure, 22 Policy-based dynamic privacy, 43, 311

Portability, 77, 78, 83–85, 99, 109, 164, 252, 261, 268, 279

P2P-MapReduce, 114, 116–125 Prepaid cloud hosting, 30

Pricing, 25, 30, 50, 51, 54, 59, 67, 199, 235, 345, 356, 358–359, 363, 364, 369

Pricing strategies, 30

Privacy, 23, 24, 28, 31–32, 42, 43, 50, 51, 53–54, 58, 59, 73, 81, 86, 243, 250, 258, 260, 269, 272, 275–277, 279, 281, 285–287, 295, 298, 300, 307, 316, 321

Privacy issues, 276–277

Private cloud, 3, 4, 23, 26, 32, 53, 55, 79, 98, 145–161, 165, 169, 171, 182, 195, 196, 199, 201, 228, 232, 274, 275, 281, 285, 286, 299–300, 313, 316, 346, 363, 365, 366, 370

Private cloud computing, 196 Provisioning, 7, 9, 28, 31, 63, 79, 97, 107,

131, 143, 176, 180–182, 184, 186, 187, 191, 192, 195–216, 220, 226, 229, 232, 267, 272, 295, 308, 314, 321, 323, 357

Proxy load balancing, 37

Public cloud, 3, 4, 23, 26, 31, 32, 53, 78, 79, 81, 145–147, 160, 171, 196, 198–200, 232, 235, 274–277, 280, 281, 285, 286, 300, 315–317, 319, 321, 346, 348, 350, 363, 365, 370, 371

Python, 5, 41, 56, 228

378

Q

Quality of Service (QoS), 22, 74, 131, 196, 209, 231, 249, 328, 331, 343, 353

R

Rackspace, 26, 265, 274 Rails, 15, 39

Recommender system, 229, 230 Regulations, 28, 68, 243–245, 254, 259, 290,

295, 359

Regulatory and legislative compliance, 279–281

Regulatory compliance, 41, 280, 290, 347 Reliability, 32, 44, 66, 68, 72–75, 77, 81, 86,

99–102, 104, 106, 107, 109, 124, 132, 179, 224, 235, 244, 267, 298, 307, 315, 317, 328, 346, 362

Remote Method Invocation (RMI), 14 Remote Procedure Call (RPC), 13–16 Replication, 24, 27, 41, 42, 67, 125, 139, 147,

154, 206, 216, 224

Representative State Transfer (REST), 14, 16, 17, 30, 81, 95, 101, 165, 197, 248, 250, 262, 266, 299, 316

Resource discovery, 119, 222

Resource management, 27, 28, 31, 44, 71, 98, 128, 143, 147, 179–193

Resource scheduling, 28

Resource sharing, 41, 55, 65, 72, 127, 128, 179, 220, 330

Resource utilization, 42, 54, 175, 180, 297, 299

RESTful, 27, 262, 265 Rightscale, 6, 26, 33, 81, 318, 323

Risk Management and Compliance, 78, 85–87

Risks inherent in cloud computing, 272, 275 RSA, 316

Ruby, 35, 38, 39

S

S3, 13, 22, 30, 41, 43, 64, 66, 74, 132, 164, 192, 228, 267, 315

SaaS provider, 41–42, 201, 306, 344, 356 SaaS software, 25, 362

SaaS vendors, 23 Safe harbour, 279

Salesforce, 23, 25, 33, 66, 74, 75, 269, 274, 286, 311, 362

SalesForce.com (SFDC), 25, 33, 42 SAN, 35

SAS70, 35, 41

Index

Scalability, 12, 22, 27–29, 41, 42, 44, 55, 66, 69, 73, 128, 129, 131, 132, 151, 157, 158, 197, 205, 259, 260, 308, 309, 313–315, 346

Scalable, 5, 22, 24, 27, 28, 42, 48, 73, 127–143

Scalable storage, 22, 42, 73, 322

Scaling, 4, 41, 73, 180, 200, 201, 264, 314, 329, 338

Scheduler, 12, 106–109, 146, 149, 151, 154–156, 165, 175–177, 181–183, 190, 192, 222, 224, 225, 227, 229, 232–235, 334, 335, 365

Scheduling, 13, 28, 101, 142, 156, 176, 181, 190, 193, 196, 212, 220, 222–225, 227, 229–235, 330, 363, 366, 370, 371

Scientific computing, 95, 96, 137, 146, 151, 153, 155, 158, 179, 180, 192

Scientific workflow, 48–50, 188 S3 downtime, 45

Secret, 146, 226, 246, 267, 278, 285 Secure cloud, 41, 291, 295 Security policy issues, 283

Security requirements, 245, 251, 271, 275, 276, 281, 284, 286, 287, 299

Self-configuring virtual clusters, 39 Self-service application provisioning, 31 Semantic interoperability, 24

Server virtualization, 7, 8, 26, 27 Service discovery, 27, 104, 195–216 Service economy, 333

Service Level Agreement (SLA), 30, 44, 94, 98, 100, 101, 104, 107, 109, 110, 196, 199, 258, 283, 313, 338, 344, 345, 354, 358, 363, 364

Service Oriented Architecture (SOA), 14–17, 66, 72, 94, 101, 138, 151, 272, 305–307, 309–315, 317, 320–322, 324

Service plane, 135–137 Shibboleth, 339

Simple API for Grid Applications (SAGA), 69 SimpleDB, 30, 267, 315

Simple Object Access Protocol (SOAP), 15, 101, 136, 168, 306, 316, 321

Slave replication, 41 Snapshot, 42

Snapshot replication, 42

Software as a Service (SaaS), 5, 17, 23, 25, 33, 41–42, 52, 53, 66, 67, 73, 79, 81, 84–86, 94, 164, 196, 198, 201, 247, 268, 272, 276, 279, 284, 285, 306, 309, 311, 344, 345, 355–357, 359, 361, 362

Solaris, 36, 38, 39, 85 SQL, 43, 213, 265

Index

Standardization, 43, 74, 261, 262, 268, 307, 309

Standards, 9, 15, 16, 28, 30, 33, 41, 43, 48, 50, 51, 55–57, 59, 73, 74, 77–88, 110, 175, 229, 251, 259, 261, 262, 264, 266, 269, 280, 290, 294, 313, 354

Storage virtualization, 26 Subscription-based pricing, 30 Sun cloud, 41, 42

T

Tenancy, 81, 273, 282, 286, 355–357 Tenants, 317

3Tera, 80, 268 Teraport cluster, 39 Terminal server, 27

Third-party cloud resource, 274 Top500, 45, 178

Top secret, 246, 277, 278, 285 Transparent metering, 30 Trust issues, 282–283 Tunneling, 168–170, 174, 178

U

Ubiquitous network access, 272, 282, 286 Understanding risks to cloud computing,

275–284

Unified cloud interface, 81 Universal Description Discovery and

Integration (UDDI), 15, 22 Usage metering, 25

Utility, 31, 44, 63, 64, 71, 75, 93, 94, 96–98, 109, 128, 182, 225, 265, 284, 287, 292, 293, 337, 338, 346, 361, 363

Utility computing, 93, 109, 225, 361, 363

V

Value at Risk (VaR), 364–365, 370 Vendor lock-in, 29, 73–74, 78, 79,

261, 290

Vendors, 5, 23–25, 28–30, 42, 44, 46, 73–74, 78–88, 242, 251, 252, 261, 265, 274, 281, 286, 290, 309, 313, 314, 343–346, 351, 353–359, 362, 363

Vertical scalability, 309 Virtualbox, 26

Virtual clusters, 10, 39 Virtual desktop, 27

Virtual Infrastructure manager (VIM), 7, 9–10

379

Virtualization (paravirtualization, full virtualization), 5–11, 17, 22–27, 41, 42, 55, 57, 71, 74, 94, 99, 102, 110, 127, 129, 132, 138, 149, 164, 165, 180, 182, 189, 246, 261, 268, 269, 291

Virtualized infrastructure, 28

Virtual Machine (VM), 5, 7, 8, 28, 67–69, 72, 79, 84, 95, 106–109, 138, 155, 156, 196, 198, 204, 205, 208–215, 261, 283, 318

Virtual Machine Monitor (VMM, hypervisor), 7, 8

Virtual organization membership services (VOMS), 140

Virtual Private Network (VPN), 169, 170, 177, 178, 248, 287, 313, 319

VM images, 108

VM provisioning, 196 VMware, 8, 9, 26, 72, 83, 161

Volunteer computing, 95–99, 103–104, 146–153, 155, 156, 160, 161

VOMS. See Virtual organization membership services

W

Walrus, 40

Wavelength Division Multiplexing (WDM), 131

Web Service Description Language (WSDL), 15, 136

Web Services Policy (WS-Policy), 16

Web Services Resource Framework (WSRF), 16, 42, 66, 136, 143

Web Services Security (WS-Security), 16, 314, 317, 319–321, 323

WIEN2k, 188–191

World privacy forum, 258, 276

X

Xen hypervisor, 34, 36, 39

XVM, 36

Y

YML, 145–161

Z

Zetta-byte file system (ZFS), 36

Zimory, 26

Соседние файлы в папке CLOUD COMPUTING