Cloud Computing Security: Foundations and Challenges
Editat de John R. Vaccaen Limba Engleză Hardback – 9 noi 2020
Features
- Covers patching and configuration vulnerabilities of a cloud server
- Evaluates methods for data encryption and long-term storage in a cloud server
- Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
Preț: 929.03 lei
Preț vechi: 1161.28 lei
-20%
Puncte Express: 1394
Preț estimativ în valută:
164.24€ • 195.82$ • 142.45£
164.24€ • 195.82$ • 142.45£
Carte disponibilă
Livrare economică 24 februarie-10 martie
Specificații
ISBN-13: 9780367151164
ISBN-10: 0367151162
Pagini: 548
Ilustrații: 130 Line drawings, black and white; 136 Halftones, black and white
Dimensiuni: 216 x 279 mm
Greutate: 1.68 kg
Ediția:2 New edition
Editura: CRC Press
Colecția CRC Press
ISBN-10: 0367151162
Pagini: 548
Ilustrații: 130 Line drawings, black and white; 136 Halftones, black and white
Dimensiuni: 216 x 279 mm
Greutate: 1.68 kg
Ediția:2 New edition
Editura: CRC Press
Colecția CRC Press
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Section IIntroduction
Chapter 1 ▪ Cloud Computing Essentials 3
Anna Squicciarini, Daniela Oliveira, and Dan Lin
Chapter 2 ▪ An Overview of Cloud Computing 13
William Stallings
Chapter 3 ▪ Cloud Security Baselines 31
Daniela Oliveira, Anna Squicciarini, and Dan Lin
Chapter 4 ▪ Cloud Security, Privacy and Trust Baselines 45
Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis
Chapter 5 ▪ Infrastructure as a Service (IaaS) 65
Mario Santana
Section IIRisk Analysis and Division of Responsibility
Chapter 6 ▪ Risk and Trust As ess ment: Schemes for Cloud Services 73
Erdal Cayirci
Chapter 7 ▪ Managing Risk in the Cloud 85
Michaela Iorga and Anil Karmel
Chapter 8 ▪ Cloud Security Risk Management 95
Marco Cremonini
Chapter 9 ▪ Secure Cloud Risk Management: Risk Mitigation Methods 115
Jim Harmening and Randall DeVitto
Section IIISecuring the Cloud Infrastructure
Chapter 10 ▪ Specification and Enforcement of Access Policies in Emerging Scenarios 129
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
Chapter 11 ▪ Cryptographic Key Management for Data Protection 151
Sarbari Gupta
Chapter 12 ▪ Cloud Security Access Control: Distributed Access Control 157
Jim Harmening and Randall DeVitto
Chapter 13 ▪ Cloud Security Key Management: Cloud User Controls 167
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
Chapter 14 ▪ Cloud Computing Security Ess entials and Architecture 195
Michaela Iorga and Anil Karmel
Chapter 15 ▪ Cloud Computing Architecture and Security Concepts 213
Pramod Pandya and Riad Rahmo
Chapter 16 ▪ Secure Cloud Architecture 225
Pramod Pandya
Section IVOperating System and Network Security
Chapter 17 ▪ Locking Down Cloud Servers 237
Thorsten Herre
Chapter 18 ▪ Third-Party Providers Integrity Assurance for Data Outsourcing 255
Jiawei Yuan and Shucheng Yu
Section VMeeting Compliance Requirements
Chapter 19 ▪ Negotiating Cloud Security Requirements with Vendors 271
Daniel S. Soper
Chapter 20 ▪ Managing Legal Compliance in the Cloud: Understanding Contractual and
Personal Data Protection Requirements 283
Paolo Balboni
Chapter 21 ▪ Integrity Assurance for Data Outsourcing 299
Reza Curtmola and Bo Chen
Chapter 22 ▪ Secure Computation Outsourcing 311
Shams Zawoad and Ragib Hasan
Chapter 23 ▪ Computation Over Encrypted Data 329
Feng-Hao Liu
Chapter 24 ▪ Trusted Computing Technology 347
Felipe E. Medina
Chapter 25 ▪ Technology for Trusted Cloud Security: Survey and Open Issues 357
Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
Chapter 26 ▪ Trusted Computing Technology and Proposals for Resolving Cloud Computing
Security Problems 373
Ignazio Pedone, Daniele Canavese, and Antonio Lioy
Chapter 27 ▪ Assuring Compliance with Government Certification and Accreditation Regulations 387
Sarbari Gupta
Chapter 28 ▪ Government Certification, Accreditation, Regulations, and Compliance Risks 395
Thorsten Herre
Section VIPreparing for Disaster Recovery
Chapter 29 ▪ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411
Thorsten Herre
Chapter 30 ▪ Availability, Recovery, and Auditing across Data Centers 425
Reza Curtmola and Bo Chen
Section VIIAdvanced Cloud Computing Security
Chapter 31 ▪ Advanced Security Architecture for Cloud Computing 443
Albert Caballero
Chapter 32 ▪ Side-Channel Attacks and Defenses on Cloud Traffic 463
Wen Ming Liu and Lingyu Wang
Chapter 33 ▪ Clouds Are Evil 477
John Strand
Chapter 34 ▪ Future Directions in Cloud Computing Security: Risks and Challenges 489
Mohammad Kamrul Islam and Rasib Khan
Chapter 1 ▪ Cloud Computing Essentials 3
Anna Squicciarini, Daniela Oliveira, and Dan Lin
Chapter 2 ▪ An Overview of Cloud Computing 13
William Stallings
Chapter 3 ▪ Cloud Security Baselines 31
Daniela Oliveira, Anna Squicciarini, and Dan Lin
Chapter 4 ▪ Cloud Security, Privacy and Trust Baselines 45
Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis
Chapter 5 ▪ Infrastructure as a Service (IaaS) 65
Mario Santana
Section IIRisk Analysis and Division of Responsibility
Chapter 6 ▪ Risk and Trust As ess ment: Schemes for Cloud Services 73
Erdal Cayirci
Chapter 7 ▪ Managing Risk in the Cloud 85
Michaela Iorga and Anil Karmel
Chapter 8 ▪ Cloud Security Risk Management 95
Marco Cremonini
Chapter 9 ▪ Secure Cloud Risk Management: Risk Mitigation Methods 115
Jim Harmening and Randall DeVitto
Section IIISecuring the Cloud Infrastructure
Chapter 10 ▪ Specification and Enforcement of Access Policies in Emerging Scenarios 129
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
Chapter 11 ▪ Cryptographic Key Management for Data Protection 151
Sarbari Gupta
Chapter 12 ▪ Cloud Security Access Control: Distributed Access Control 157
Jim Harmening and Randall DeVitto
Chapter 13 ▪ Cloud Security Key Management: Cloud User Controls 167
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
Chapter 14 ▪ Cloud Computing Security Ess entials and Architecture 195
Michaela Iorga and Anil Karmel
Chapter 15 ▪ Cloud Computing Architecture and Security Concepts 213
Pramod Pandya and Riad Rahmo
Chapter 16 ▪ Secure Cloud Architecture 225
Pramod Pandya
Section IVOperating System and Network Security
Chapter 17 ▪ Locking Down Cloud Servers 237
Thorsten Herre
Chapter 18 ▪ Third-Party Providers Integrity Assurance for Data Outsourcing 255
Jiawei Yuan and Shucheng Yu
Section VMeeting Compliance Requirements
Chapter 19 ▪ Negotiating Cloud Security Requirements with Vendors 271
Daniel S. Soper
Chapter 20 ▪ Managing Legal Compliance in the Cloud: Understanding Contractual and
Personal Data Protection Requirements 283
Paolo Balboni
Chapter 21 ▪ Integrity Assurance for Data Outsourcing 299
Reza Curtmola and Bo Chen
Chapter 22 ▪ Secure Computation Outsourcing 311
Shams Zawoad and Ragib Hasan
Chapter 23 ▪ Computation Over Encrypted Data 329
Feng-Hao Liu
Chapter 24 ▪ Trusted Computing Technology 347
Felipe E. Medina
Chapter 25 ▪ Technology for Trusted Cloud Security: Survey and Open Issues 357
Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
Chapter 26 ▪ Trusted Computing Technology and Proposals for Resolving Cloud Computing
Security Problems 373
Ignazio Pedone, Daniele Canavese, and Antonio Lioy
Chapter 27 ▪ Assuring Compliance with Government Certification and Accreditation Regulations 387
Sarbari Gupta
Chapter 28 ▪ Government Certification, Accreditation, Regulations, and Compliance Risks 395
Thorsten Herre
Section VIPreparing for Disaster Recovery
Chapter 29 ▪ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411
Thorsten Herre
Chapter 30 ▪ Availability, Recovery, and Auditing across Data Centers 425
Reza Curtmola and Bo Chen
Section VIIAdvanced Cloud Computing Security
Chapter 31 ▪ Advanced Security Architecture for Cloud Computing 443
Albert Caballero
Chapter 32 ▪ Side-Channel Attacks and Defenses on Cloud Traffic 463
Wen Ming Liu and Lingyu Wang
Chapter 33 ▪ Clouds Are Evil 477
John Strand
Chapter 34 ▪ Future Directions in Cloud Computing Security: Risks and Challenges 489
Mohammad Kamrul Islam and Rasib Khan
Descriere
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.