Muutke küpsiste eelistusi

Cloud Computing Security: Foundations and Challenges 2nd edition [Kõva köide]

Edited by (TechWrite, Pomeroy, Ohio, USA)
  • Formaat: Hardback, 522 pages, kõrgus x laius: 279x216 mm, kaal: 1170 g, 130 Line drawings, black and white; 136 Halftones, black and white
  • Ilmumisaeg: 09-Nov-2020
  • Kirjastus: CRC Press
  • ISBN-10: 0367151162
  • ISBN-13: 9780367151164
Teised raamatud teemal:
  • Formaat: Hardback, 522 pages, kõrgus x laius: 279x216 mm, kaal: 1170 g, 130 Line drawings, black and white; 136 Halftones, black and white
  • Ilmumisaeg: 09-Nov-2020
  • Kirjastus: CRC Press
  • ISBN-10: 0367151162
  • ISBN-13: 9780367151164
Teised raamatud teemal:

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.

Features

• Covers patching and configuration vulnerabilities of a cloud server

• Evaluates methods for data encryption and long-term storage in a cloud server

• Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations

John R. Vacca

is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

Foreword xi
Preface xiii
Acknowledgments xix
About the Editor xxi
Contributors xxiii
Section I Introduction
Chapter 1 Cloud Computing Essentials
3(10)
Anna Squicciarini
Daniela Oliveira
Dan Lin
Chapter 2 An Overview of Cloud Computing
13(18)
William Stallincs
Chapter 3 Cloud Security Baselines
31(14)
Daniela Oliveira
Anna Squicciarini
Dan Lin
Chapter 4 Cloud Security, Privacy and Trust Baselines
45(20)
Nikolaos Pitropakis
Sokratis Katsikas
Costas Lambrinoudakis
Chapter 5 Infrastructure as a Service (IaaS)
65(8)
Mario Santana
Section II Risk Analysis and Division of Responsibility
Chapter 6 Risk and Trust Assessment: Schemes for Cloud Services
73(12)
Erdal Cayirci
Chapter 7 Managing Risk in the Ciol:d
85(10)
Michaela Iorca
Anil Karmel
Chapter 8 Cloud Security Risk Management
95(20)
Marco Cremonini
Chapter 9 Secure Cloud Risk Management: Risk Mitigation Methods
115(14)
Jim Harmeninc
Randall Devitto
Section III Securing the Cloud Infrastructure
Chapter 10 Specification and Enforcement of Access Policies in Emerging Scenarios
129(22)
Sabrina De Capitani Di Vimercati
Sara Foresti
Pierancela Samarati
Chapter 11 Cryptographic Key Management for Data Protection
151(6)
Sarbari Gupta
Chapter 12 Cloud Security Access Control: Distributed Access Control
157(10)
Jim Harmeninc
Randall Devitto
Chapter 13 Cloud Security Key Management: Cloud User Controls
167(28)
Weiyu Jiang
Jingqiang Lin
Zhan Wang
Bo Chen
Kun Sun
Chapter 14 Cloud Computing Security Essentials and Architecture
195(18)
Michaela Iorga
Anil Karmel
Chapter 15 Cloud Computing Architecture and Security Concepts
213(12)
Pramod Pandya
Riad Rahmo
Chapter 16 Secure Cloud Architecture
225(12)
Pramod Pandya
Section IV Operating System and Network Security
Chapter 17 Locking Down Cloud Servers
237(18)
Thorsten Herre
Chapter 18 Third-Party Providers Integrity Assurance for Data Outsourcing
255(16)
Jiawei Yuan
Shuchenc Yu
Section V Meeting Compliance Requirements
Chapter 19 Negotiating Cloud Security Requirements with Vendors
271(12)
Daniel S. Soper
Chapter 20 Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements
283(16)
Paolo Balboni
Chapter 21 Integrity Assurance for Data Outsourcing
299(12)
Reza Curtmola
Bo Chen
Chapter 22 Secure Computation Outsourcing
311(18)
Shams Zawoad
Racib Hasan
Chapter 23 Computation Over Encrypted data
329(18)
Fenc-Hao Liu
Chapter 24 Trusted Computing technology
347(10)
Felipe E. Medina
Chapter 25 Technology for trusted Cloud Security: Survey and Open issues
357(16)
Roberto Di Pietro
Flavio Lombardi
Matteo Sicnorini
Chapter 26 Trusted Computing technology and proposals for Resolving Cloud Computing Security problems
373(14)
Icnazio Pedone
Daniele Canavese
Antonio Lioy
Chapter 27 Assuring Compliance with Government Certification and Accreditation Regulations
387(8)
Sarbari Gupta
Chapter 28 Government Certification, Accreditation, Regulations, and Compliance Risks
395(16)
Thorsten Herre
Section VI Preparing for Disaster Recovery
Chapter 29 Simplifying Secure Cloud Computing Environments with Cloud data Centers
411(14)
Thorsten Herre
Chapter 30 Availability, Recovery, and Auditing across data Centers
425(18)
Reza Curtmola
Bo Chen
Section VII Advanced Cloud Computing Security
Chapter 31 Advanced Security Architecture for Cloud Computing
443(20)
Albert Caballero
Chapter 32 Side-Channel Attacks and defenses on Cloud traffic
463(14)
Wen Ming Liu
Lingyu Wang
Chapter 33 Clouds Are Evil
477(12)
John Strand
Chapter 34 Future directions in Cloud Computing Security: Risks and Challenges
489(12)
Mohammad Kamrul Islam
Rasib Khan
Section VIII Appendices
Appendix A List of Top Cloud Computing Security Implementation and Deployment Companies
501(4)
Appendix B List of Cloud Computing Security Products and Services
505(6)
Index 511
John Vacca is an information technology consultant and internationally-



known author of more than 600 articles in the areas of advanced



storage, computer security and aerospace technology. John was also



a conguration management specialist, computer specialist, and the



computer security ofcial (CSO) for NASA's space station program



(Freedom) and the International Space Station Program, from 1988



until his retirement from NASA in 1995.