Cloud Computing Security: Foundations and Challenges
Editat de John R. Vaccaen Limba Engleză Paperback – 9 noi 2020
Features
• Covers patching and configuration vulnerabilities of a cloud server
• Evaluates methods for data encryption and long-term storage in a cloud server
• Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations
John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 373.62 lei 6-8 săpt. | |
CRC Press – 9 noi 2020 | 373.62 lei 6-8 săpt. | |
Hardback (1) | 732.83 lei 6-8 săpt. | |
CRC Press – 9 noi 2020 | 732.83 lei 6-8 săpt. |
Preț: 373.62 lei
Preț vechi: 529.74 lei
-29% Nou
Puncte Express: 560
Preț estimativ în valută:
71.49€ • 75.50$ • 59.50£
71.49€ • 75.50$ • 59.50£
Carte tipărită la comandă
Livrare economică 11-25 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780367560331
ISBN-10: 036756033X
Pagini: 548
Ilustrații: 130 Line drawings, black and white; 136 Halftones, black and white
Dimensiuni: 216 x 279 x 35 mm
Greutate: 1.41 kg
Ediția:2 ed
Editura: CRC Press
Colecția CRC Press
ISBN-10: 036756033X
Pagini: 548
Ilustrații: 130 Line drawings, black and white; 136 Halftones, black and white
Dimensiuni: 216 x 279 x 35 mm
Greutate: 1.41 kg
Ediția:2 ed
Editura: CRC Press
Colecția CRC Press
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Section IIntroduction
Chapter 1 ▪ Cloud Computing Essentials 3
Anna Squicciarini, Daniela Oliveira, and Dan Lin
Chapter 2 ▪ An Overview of Cloud Computing 13
William Stallings
Chapter 3 ▪ Cloud Security Baselines 31
Daniela Oliveira, Anna Squicciarini, and Dan Lin
Chapter 4 ▪ Cloud Security, Privacy and Trust Baselines 45
Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis
Chapter 5 ▪ Infrastructure as a Service (IaaS) 65
Mario Santana
Section IIRisk Analysis and Division of Responsibility
Chapter 6 ▪ Risk and Trust As ess ment: Schemes for Cloud Services 73
Erdal Cayirci
Chapter 7 ▪ Managing Risk in the Cloud 85
Michaela Iorga and Anil Karmel
Chapter 8 ▪ Cloud Security Risk Management 95
Marco Cremonini
Chapter 9 ▪ Secure Cloud Risk Management: Risk Mitigation Methods 115
Jim Harmening and Randall DeVitto
Section IIISecuring the Cloud Infrastructure
Chapter 10 ▪ Specification and Enforcement of Access Policies in Emerging Scenarios 129
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
Chapter 11 ▪ Cryptographic Key Management for Data Protection 151
Sarbari Gupta
Chapter 12 ▪ Cloud Security Access Control: Distributed Access Control 157
Jim Harmening and Randall DeVitto
Chapter 13 ▪ Cloud Security Key Management: Cloud User Controls 167
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
Chapter 14 ▪ Cloud Computing Security Ess entials and Architecture 195
Michaela Iorga and Anil Karmel
Chapter 15 ▪ Cloud Computing Architecture and Security Concepts 213
Pramod Pandya and Riad Rahmo
Chapter 16 ▪ Secure Cloud Architecture 225
Pramod Pandya
Section IVOperating System and Network Security
Chapter 17 ▪ Locking Down Cloud Servers 237
Thorsten Herre
Chapter 18 ▪ Third-Party Providers Integrity Assurance for Data Outsourcing 255
Jiawei Yuan and Shucheng Yu
Section VMeeting Compliance Requirements
Chapter 19 ▪ Negotiating Cloud Security Requirements with Vendors 271
Daniel S. Soper
Chapter 20 ▪ Managing Legal Compliance in the Cloud: Understanding Contractual and
Personal Data Protection Requirements 283
Paolo Balboni
Chapter 21 ▪ Integrity Assurance for Data Outsourcing 299
Reza Curtmola and Bo Chen
Chapter 22 ▪ Secure Computation Outsourcing 311
Shams Zawoad and Ragib Hasan
Chapter 23 ▪ Computation Over Encrypted Data 329
Feng-Hao Liu
Chapter 24 ▪ Trusted Computing Technology 347
Felipe E. Medina
Chapter 25 ▪ Technology for Trusted Cloud Security: Survey and Open Issues 357
Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
Chapter 26 ▪ Trusted Computing Technology and Proposals for Resolving Cloud Computing
Security Problems 373
Ignazio Pedone, Daniele Canavese, and Antonio Lioy
Chapter 27 ▪ Assuring Compliance with Government Certification and Accreditation Regulations 387
Sarbari Gupta
Chapter 28 ▪ Government Certification, Accreditation, Regulations, and Compliance Risks 395
Thorsten Herre
Section VIPreparing for Disaster Recovery
Chapter 29 ▪ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411
Thorsten Herre
Chapter 30 ▪ Availability, Recovery, and Auditing across Data Centers 425
Reza Curtmola and Bo Chen
Section VIIAdvanced Cloud Computing Security
Chapter 31 ▪ Advanced Security Architecture for Cloud Computing 443
Albert Caballero
Chapter 32 ▪ Side-Channel Attacks and Defenses on Cloud Traffic 463
Wen Ming Liu and Lingyu Wang
Chapter 33 ▪ Clouds Are Evil 477
John Strand
Chapter 34 ▪ Future Directions in Cloud Computing Security: Risks and Challenges 489
Mohammad Kamrul Islam and Rasib Khan
Chapter 1 ▪ Cloud Computing Essentials 3
Anna Squicciarini, Daniela Oliveira, and Dan Lin
Chapter 2 ▪ An Overview of Cloud Computing 13
William Stallings
Chapter 3 ▪ Cloud Security Baselines 31
Daniela Oliveira, Anna Squicciarini, and Dan Lin
Chapter 4 ▪ Cloud Security, Privacy and Trust Baselines 45
Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis
Chapter 5 ▪ Infrastructure as a Service (IaaS) 65
Mario Santana
Section IIRisk Analysis and Division of Responsibility
Chapter 6 ▪ Risk and Trust As ess ment: Schemes for Cloud Services 73
Erdal Cayirci
Chapter 7 ▪ Managing Risk in the Cloud 85
Michaela Iorga and Anil Karmel
Chapter 8 ▪ Cloud Security Risk Management 95
Marco Cremonini
Chapter 9 ▪ Secure Cloud Risk Management: Risk Mitigation Methods 115
Jim Harmening and Randall DeVitto
Section IIISecuring the Cloud Infrastructure
Chapter 10 ▪ Specification and Enforcement of Access Policies in Emerging Scenarios 129
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
Chapter 11 ▪ Cryptographic Key Management for Data Protection 151
Sarbari Gupta
Chapter 12 ▪ Cloud Security Access Control: Distributed Access Control 157
Jim Harmening and Randall DeVitto
Chapter 13 ▪ Cloud Security Key Management: Cloud User Controls 167
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
Chapter 14 ▪ Cloud Computing Security Ess entials and Architecture 195
Michaela Iorga and Anil Karmel
Chapter 15 ▪ Cloud Computing Architecture and Security Concepts 213
Pramod Pandya and Riad Rahmo
Chapter 16 ▪ Secure Cloud Architecture 225
Pramod Pandya
Section IVOperating System and Network Security
Chapter 17 ▪ Locking Down Cloud Servers 237
Thorsten Herre
Chapter 18 ▪ Third-Party Providers Integrity Assurance for Data Outsourcing 255
Jiawei Yuan and Shucheng Yu
Section VMeeting Compliance Requirements
Chapter 19 ▪ Negotiating Cloud Security Requirements with Vendors 271
Daniel S. Soper
Chapter 20 ▪ Managing Legal Compliance in the Cloud: Understanding Contractual and
Personal Data Protection Requirements 283
Paolo Balboni
Chapter 21 ▪ Integrity Assurance for Data Outsourcing 299
Reza Curtmola and Bo Chen
Chapter 22 ▪ Secure Computation Outsourcing 311
Shams Zawoad and Ragib Hasan
Chapter 23 ▪ Computation Over Encrypted Data 329
Feng-Hao Liu
Chapter 24 ▪ Trusted Computing Technology 347
Felipe E. Medina
Chapter 25 ▪ Technology for Trusted Cloud Security: Survey and Open Issues 357
Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
Chapter 26 ▪ Trusted Computing Technology and Proposals for Resolving Cloud Computing
Security Problems 373
Ignazio Pedone, Daniele Canavese, and Antonio Lioy
Chapter 27 ▪ Assuring Compliance with Government Certification and Accreditation Regulations 387
Sarbari Gupta
Chapter 28 ▪ Government Certification, Accreditation, Regulations, and Compliance Risks 395
Thorsten Herre
Section VIPreparing for Disaster Recovery
Chapter 29 ▪ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411
Thorsten Herre
Chapter 30 ▪ Availability, Recovery, and Auditing across Data Centers 425
Reza Curtmola and Bo Chen
Section VIIAdvanced Cloud Computing Security
Chapter 31 ▪ Advanced Security Architecture for Cloud Computing 443
Albert Caballero
Chapter 32 ▪ Side-Channel Attacks and Defenses on Cloud Traffic 463
Wen Ming Liu and Lingyu Wang
Chapter 33 ▪ Clouds Are Evil 477
John Strand
Chapter 34 ▪ Future Directions in Cloud Computing Security: Risks and Challenges 489
Mohammad Kamrul Islam and Rasib Khan
Descriere
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.