Cantitate/Preț
Produs

Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices: SpringerBriefs in Computer Science

Autor Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas
en Limba Engleză Paperback – 12 oct 2016
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.

Citește tot Restrânge

Din seria SpringerBriefs in Computer Science

Preț: 29001 lei

Preț vechi: 36251 lei
-20% Nou

Puncte Express: 435

Preț estimativ în valută:
5550 5726$ 4697£

Carte tipărită la comandă

Livrare economică 28 februarie-06 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319449616
ISBN-10: 3319449613
Pagini: 113
Ilustrații: XII, 101 p. 29 illus. in color.
Dimensiuni: 155 x 235 x 10 mm
Greutate: 0.17 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seria SpringerBriefs in Computer Science

Locul publicării:Cham, Switzerland

Cuprins

The Cloud Environment Security Landscape.- Common Attacks and Vulnerabilities in Cloud Storage.- Cloud Storage Security Mechanisms.- Cloud Storage Security Architecture.- Afterword.

Textul de pe ultima copertă

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.

Caracteristici

Presents step-by-step guidelines for practical implementation and deployment Provides recommendations on the most up-to-date security methods and algorithms Describes stable solutions for “Man-in-the Cloud” attacks, attacks on mobile devices, and Cryptolocker-type attacks Outlines the essential details of mobile environment protection, and offers detailed information on security methods that avoid the need to re-download multiple corporate files on a user device