Muutke küpsiste eelistusi

Data Security in Cloud Computing, Volume II [Pehme köide]

This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.

Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more.

Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The book’s content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.

List of Figures
xi
List of Tables
xiii
List of Abbreviations
xv
Acknowledgments xvii
Introduction xix
Chapter 7 Secure Cloud Architecture
1(10)
7.1 Governance and Comprehensive Risk Analysis
4(7)
Chapter 8 Risk and Trust Assessment
11(14)
Chapter 9 Managing Risk in the Cloud
25(12)
Chapter 10 Cloud Security Access Control
37(12)
10.1 Improvements
44(1)
10.2 Multilevel Authentication
45(1)
10.3 Encryption
46(1)
10.4 Password Administration
46(1)
10.5 Distributed Servers
46(3)
Chapter 11 Cloud Security Risk Management
49(22)
11.1 Risk in the Cloud
49(2)
11.2 Indirect Measurements and Metrics
51(1)
11.3 Definitions of Risk
52(3)
11.4 Risk and Cloud
55(16)
11.4.1 Security Risks Not Particular to Cloud Computing
55(2)
11.4.2 Cloud--specific Hazards
57(4)
11.4.3 Safety SLA for Cloud Services
61(10)
Chapter 12 Infrastructure--as--a--Service (IaaS)
71(6)
12.1 Considerations
71(2)
12.2 Network
73(1)
12.3 Security Implications
73(1)
12.4 Storage
74(1)
12.5 Databases
75(1)
12.6 Control
75(2)
Chapter 13 Cryptographic Key Management for Data Protection
77(8)
13.1 Key Management System Design Choices
80(2)
13.2 Cloud Key Management Challenges
82(1)
13.3 Cloud Key Management Strategies
83(2)
13.3.1 Establish Trust in Crypto Module
83(1)
13.3.2 Use Key Splitting Techniques
84(1)
Chapter 14 Managing Legal Compliance Risk and Personal Data Protection
85(16)
14.1 Digital Agenda for Europe 2015
87(2)
14.2 Addressing Legal Compliance
89(12)
14.2.1 Precontractual phase
89(1)
14.2.2 Step 1: Precontractual Phase
90(1)
14.2.3 Risks and Opportunities for Your Cloud Service Client
90(1)
14.2.4 Outsourcing Cloud Services
90(1)
14.2.5 Step 2: Major Issues in Entering a Cloud Service Contract
91(1)
14.2.6 Jurisdiction and Applicable Law
91(2)
14.2.7 Privacy Roles
93(1)
14.2.8 Amendments to the Contract
94(1)
14.2.9 Data Location and Transfers of Data
94(1)
14.2.10 Processing of Personal Data by Subcontractors
95(1)
14.2.11 Data Subjects' Rights (Intervenability)
96(1)
14.2.12 Step 3: Exiting a Cloud Service Contract: Major Issues
96(1)
14.2.13 Lock--in and Interoperability
96(1)
14.2.14 Service--level Agreements
96(1)
14.2.15 Termination of the Contract
97(4)
Chapter 15 Future Directions in Cloud Computing Security
101(4)
15.1 Categories
102(3)
About the Author 105(2)
Index 107
Giulio D'Agostino is a system administrator, author, and technologist with more than 20 years of experience in the cloud computing, software as a service, and publishing. Previously worked for Google, Apple, Hewlett Packard, and Salesforce.com, Giulio has lectured at the Technical University of DenmarkDTU, Web Summit 2016/2017 and is currently a system administrator for a software as a service and cloud-based provider company LogMeIn Inc.