Cloud Computing Security

Foundations and Challenges
 
 
CRC Press
  • 2. Auflage
  • |
  • erscheint ca. am 9. November 2020
  • |
  • 548 Seiten
 
E-Book | PDF ohne DRM | Systemvoraussetzungen
978-0-429-62179-6 (ISBN)
 

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.

Features

. Covers patching and configuration vulnerabilities of a cloud server

. Evaluates methods for data encryption and long-term storage in a cloud server

. Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations

John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA's space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

2. Auflage
  • Englisch
  • Milton
  • |
  • Großbritannien
Taylor & Francis Ltd
  • Für höhere Schule und Studium
  • Neue Ausgabe
136 schwarz-weiße Fotos, 130 schwarz-weiße Zeichnungen
  • 63,23 MB
978-0-429-62179-6 (9780429621796)
weitere Ausgaben werden ermittelt

John Vacca is an information technology consultant and internationally-

known author of more than 600 articles in the areas of advanced

storage, computer security and aerospace technology. John was also

a conguration management specialist, computer specialist, and the

computer security ofcial (CSO) for NASA's space station program

(Freedom) and the International Space Station Program, from 1988

until his retirement from NASA in 1995.

Section I Introduction

Chapter 1 ¿ Cloud Computing Essentials 3

Anna Squicciarini, Daniela Oliveira, and Dan Lin

Chapter 2 ¿ An Overview of Cloud Computing 13

William Stallings

Chapter 3 ¿ Cloud Security Baselines 31

Daniela Oliveira, Anna Squicciarini, and Dan Lin

Chapter 4 ¿ Cloud Security, Privacy and Trust Baselines 45

Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis

Chapter 5 ¿ Infrastructure as a Service (IaaS) 65

Mario Santana

Section II Risk Analysis and Division of Responsibility

Chapter 6 ¿ Risk and Trust As ess ment: Schemes for Cloud Services 73

Erdal Cayirci

Chapter 7 ¿ Managing Risk in the Cloud 85

Michaela Iorga and Anil Karmel

Chapter 8 ¿ Cloud Security Risk Management 95

Marco Cremonini

Chapter 9 ¿ Secure Cloud Risk Management: Risk Mitigation Methods 115

Jim Harmening and Randall DeVitto

Section III Securing the Cloud Infrastructure

Chapter 10 ¿ Specification and Enforcement of Access Policies in Emerging Scenarios 129

Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati

Chapter 11 ¿ Cryptographic Key Management for Data Protection 151

Sarbari Gupta

Chapter 12 ¿ Cloud Security Access Control: Distributed Access Control 157

Jim Harmening and Randall DeVitto

Chapter 13 ¿ Cloud Security Key Management: Cloud User Controls 167

Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun

Chapter 14 ¿ Cloud Computing Security Ess entials and Architecture 195

Michaela Iorga and Anil Karmel

Chapter 15 ¿ Cloud Computing Architecture and Security Concepts 213

Pramod Pandya and Riad Rahmo

Chapter 16 ¿ Secure Cloud Architecture 225

Pramod Pandya

Section IV Operating System and Network Security

Chapter 17 ¿ Locking Down Cloud Servers 237

Thorsten Herre

Chapter 18 ¿ Third-Party Providers Integrity Assurance for Data Outsourcing 255

Jiawei Yuan and Shucheng Yu

Section V Meeting Compliance Requirements

Chapter 19 ¿ Negotiating Cloud Security Requirements with Vendors 271

Daniel S. Soper

Chapter 20 ¿ Managing Legal Compliance in the Cloud: Understanding Contractual and

Personal Data Protection Requirements 283

Paolo Balboni

Chapter 21 ¿ Integrity Assurance for Data Outsourcing 299

Reza Curtmola and Bo Chen

Chapter 22 ¿ Secure Computation Outsourcing 311

Shams Zawoad and Ragib Hasan

Chapter 23 ¿ Computation Over Encrypted Data 329

Feng-Hao Liu

Chapter 24 ¿ Trusted Computing Technology 347

Felipe E. Medina

Chapter 25 ¿ Technology for Trusted Cloud Security: Survey and Open Issues 357

Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini

Chapter 26 ¿ Trusted Computing Technology and Proposals for Resolving Cloud Computing

Security Problems 373

Ignazio Pedone, Daniele Canavese, and Antonio Lioy

Chapter 27 ¿ Assuring Compliance with Government Certification and Accreditation Regulations 387

Sarbari Gupta

Chapter 28 ¿ Government Certification, Accreditation, Regulations, and Compliance Risks 395

Thorsten Herre

Section VI Preparing for Disaster Recovery

Chapter 29 ¿ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411

Thorsten Herre

Chapter 30 ¿ Availability, Recovery, and Auditing across Data Centers 425

Reza Curtmola and Bo Chen

Section VII Advanced Cloud Computing Security

Chapter 31 ¿ Advanced Security Architecture for Cloud Computing 443

Albert Caballero

Chapter 32 ¿ Side-Channel Attacks and Defenses on Cloud Traffic 463

Wen Ming Liu and Lingyu Wang

Chapter 33 ¿ Clouds Are Evil 477

John Strand

Chapter 34 ¿ Future Directions in Cloud Computing Security: Risks and Challenges 489

Mohammad Kamrul Islam and Rasib Khan

Dateiformat: PDF
Kopierschutz: ohne DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Ein Kopierschutz bzw. Digital Rights Management wird bei diesem E-Book nicht eingesetzt.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

61,49 €
inkl. 5% MwSt.
Download / Einzel-Lizenz
PDF ohne DRM
siehe Systemvoraussetzungen
E-Book bestellen