Foreword |
|
xi | |
Preface |
|
xiii | |
Acknowledgments |
|
xix | |
About the Editor |
|
xxi | |
Contributors |
|
xxiii | |
|
|
|
Chapter 1 Cloud Computing Essentials |
|
|
3 | (10) |
|
|
|
|
Chapter 2 An Overview of Cloud Computing |
|
|
13 | (18) |
|
|
Chapter 3 Cloud Security Baselines |
|
|
31 | (14) |
|
|
|
|
Chapter 4 Cloud Security, Privacy and Trust Baselines |
|
|
45 | (20) |
|
|
|
|
Chapter 5 Infrastructure as a Service (IaaS) |
|
|
65 | (8) |
|
|
Section II Risk Analysis and Division of Responsibility |
|
|
|
Chapter 6 Risk and Trust Assessment: Schemes for Cloud Services |
|
|
73 | (12) |
|
|
Chapter 7 Managing Risk in the Ciol:d |
|
|
85 | (10) |
|
|
|
Chapter 8 Cloud Security Risk Management |
|
|
95 | (20) |
|
|
Chapter 9 Secure Cloud Risk Management: Risk Mitigation Methods |
|
|
115 | (14) |
|
|
|
Section III Securing the Cloud Infrastructure |
|
|
|
Chapter 10 Specification and Enforcement of Access Policies in Emerging Scenarios |
|
|
129 | (22) |
|
Sabrina De Capitani Di Vimercati |
|
|
|
|
Chapter 11 Cryptographic Key Management for Data Protection |
|
|
151 | (6) |
|
|
Chapter 12 Cloud Security Access Control: Distributed Access Control |
|
|
157 | (10) |
|
|
|
Chapter 13 Cloud Security Key Management: Cloud User Controls |
|
|
167 | (28) |
|
|
|
|
|
|
Chapter 14 Cloud Computing Security Essentials and Architecture |
|
|
195 | (18) |
|
|
|
Chapter 15 Cloud Computing Architecture and Security Concepts |
|
|
213 | (12) |
|
|
|
Chapter 16 Secure Cloud Architecture |
|
|
225 | (12) |
|
|
Section IV Operating System and Network Security |
|
|
|
Chapter 17 Locking Down Cloud Servers |
|
|
237 | (18) |
|
|
Chapter 18 Third-Party Providers Integrity Assurance for Data Outsourcing |
|
|
255 | (16) |
|
|
|
Section V Meeting Compliance Requirements |
|
|
|
Chapter 19 Negotiating Cloud Security Requirements with Vendors |
|
|
271 | (12) |
|
|
Chapter 20 Managing Legal Compliance in the Cloud: Understanding Contractual and Personal Data Protection Requirements |
|
|
283 | (16) |
|
|
Chapter 21 Integrity Assurance for Data Outsourcing |
|
|
299 | (12) |
|
|
|
Chapter 22 Secure Computation Outsourcing |
|
|
311 | (18) |
|
|
|
Chapter 23 Computation Over Encrypted data |
|
|
329 | (18) |
|
|
Chapter 24 Trusted Computing technology |
|
|
347 | (10) |
|
|
Chapter 25 Technology for trusted Cloud Security: Survey and Open issues |
|
|
357 | (16) |
|
|
|
|
Chapter 26 Trusted Computing technology and proposals for Resolving Cloud Computing Security problems |
|
|
373 | (14) |
|
|
|
|
Chapter 27 Assuring Compliance with Government Certification and Accreditation Regulations |
|
|
387 | (8) |
|
|
Chapter 28 Government Certification, Accreditation, Regulations, and Compliance Risks |
|
|
395 | (16) |
|
|
Section VI Preparing for Disaster Recovery |
|
|
|
Chapter 29 Simplifying Secure Cloud Computing Environments with Cloud data Centers |
|
|
411 | (14) |
|
|
Chapter 30 Availability, Recovery, and Auditing across data Centers |
|
|
425 | (18) |
|
|
|
Section VII Advanced Cloud Computing Security |
|
|
|
Chapter 31 Advanced Security Architecture for Cloud Computing |
|
|
443 | (20) |
|
|
Chapter 32 Side-Channel Attacks and defenses on Cloud traffic |
|
|
463 | (14) |
|
|
|
Chapter 33 Clouds Are Evil |
|
|
477 | (12) |
|
|
Chapter 34 Future directions in Cloud Computing Security: Risks and Challenges |
|
|
489 | (12) |
|
|
|
|
|
Appendix A List of Top Cloud Computing Security Implementation and Deployment Companies |
|
|
501 | (4) |
|
Appendix B List of Cloud Computing Security Products and Services |
|
|
505 | (6) |
Index |
|
511 | |