|
|
xiii | |
|
|
xv | |
|
|
xvii | |
Acknowledgments |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 Cloud Computing Essentials |
|
|
1 | (10) |
|
1.1 Infrastructure--as--a--Service |
|
|
4 | (1) |
|
1.2 Platform--as--a--Service |
|
|
4 | (1) |
|
1.3 Software--as--a--Service |
|
|
5 | (1) |
|
|
5 | (6) |
|
Chapter 2 Overview of Cloud Computing |
|
|
11 | (22) |
|
2.1 Essential Characteristics |
|
|
12 | (1) |
|
|
13 | (2) |
|
2.3 Platform--as--a--Service and IaaS |
|
|
15 | (1) |
|
2.4 Additional Cloud Services |
|
|
16 | (1) |
|
2.5 XaaS (Anything--as--a--Service) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (4) |
|
2.10 Cloud Provider Architectural Components |
|
|
24 | (1) |
|
2.11 ITU--T Cloud Computing Reference Architecture |
|
|
25 | (4) |
|
2.11.1 Cloud Computing "Actors" |
|
|
25 | (2) |
|
2.11.2 Layered Architecture |
|
|
27 | (2) |
|
2.12 Network Requirements for Cloud Computing |
|
|
29 | (4) |
|
Chapter 3 Cloud Security Baselines |
|
|
33 | (20) |
|
|
33 | (1) |
|
|
34 | (9) |
|
3.3 Other Potential Reasons for Data Leakage from the Cloud |
|
|
43 | (2) |
|
3.4 Privacy and Security in Multiclouds |
|
|
45 | (2) |
|
|
47 | (6) |
|
Chapter 4 Cloud Computing Architecture |
|
|
53 | (22) |
|
|
55 | (15) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
4.1.5 Thick or Thin or Smart? |
|
|
56 | (2) |
|
4.1.6 Thin or Web--applications Customers |
|
|
58 | (1) |
|
|
58 | (8) |
|
|
66 | (1) |
|
4.1.9 Virtual Private Cloud |
|
|
67 | (3) |
|
4.2 Cloud--storage Prerequisites |
|
|
70 | (1) |
|
4.3 Cloud OS Prerequisites |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
71 | (1) |
|
4.6 Software Prerequisites |
|
|
71 | (4) |
|
Chapter 5 Cloud Computing Security Essentials |
|
|
75 | (28) |
|
5.1 Cloud Computing Definition |
|
|
76 | (5) |
|
5.2 Cloud Computing Security Essentials |
|
|
81 | (5) |
|
5.3 Dividing Operational Responsibilities |
|
|
86 | (3) |
|
|
89 | (5) |
|
5.5 Ecosystem Orchestration Boundary |
|
|
94 | (2) |
|
|
96 | (2) |
|
5.7 Defining Your Root of Trust |
|
|
98 | (1) |
|
5.8 Managing User Authentication and Authorization |
|
|
99 | (4) |
|
|
103 | (18) |
|
6.1 The State of Cloud Security |
|
|
103 | (1) |
|
6.2 Understanding the Threats |
|
|
104 | (2) |
|
6.3 Classification and Countermeasures |
|
|
106 | (4) |
|
6.3.1 Recruitment and Host Threats |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
6.5 Infrastructure Modifications |
|
|
110 | (1) |
|
|
111 | (1) |
|
6.7 Administrative and Assets |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
6.10 Information Interception |
|
|
112 | (1) |
|
6.11 Clients' Negligence and Cloud Security |
|
|
113 | (1) |
|
6.12 Reduction of Governance |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
6.15 Service Engine Presence |
|
|
114 | (7) |
About the Author |
|
121 | (2) |
Index |
|
123 | |