𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Data Security in Cloud Computing, Volume I

✍ Scribed by Giulio D'Agostino


Publisher
Momentum Press
Year
2019
Tongue
English
Leaves
153
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.

Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more.

Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The bookΒ’s content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.

✦ Table of Contents


Cover
DATA SECURITY IN CLOUD COMPUTING, VOLUME I
Contents
List of Figures
List of Tables
List of Abbreviations
Acknowledgments
Introduction
Chapter 1: Cloud Computing Essentials
1.1. Infrastructure-as-a-Service
1.2. Platform-as-a-Service
1.3. Software-as-a-Service
1.4. Deployment Designs
Chapter 2: Overview of Cloud Computing
2.1. Essential Characteristics
2.2. Cloud Services
2.3. Platform-as-a-Service and IaaS
2.4. Additional Cloud Services
2.5. XaaS (Anything-as-a-Service)
2.6. Public Cloud
2.7. Personal Cloud
2.8. Community Cloud
2.9. Hybrid
2.10. Cloud Provider Architectural Components
2.11. ITU-T Cloud Computing Reference Architecture
2.11.1. Cloud Computing β€œActors”
2.11.2. Layered Architecture
Chapter 3: Cloud Security Baselines
3.1. Fundamentals
3.2. Program Layer
3.3. Other Potential Reasons for Data Leakage from the Cloud
3.4. Privacy and Security in Multiclouds
3.5. Cloud Accountability
Chapter 4: Cloud Computing Architecture
4.1. Hardware Customers
4.1.1. Thick Clients
4.1.2. Thin Clients
4.1.3. Smartphones
4.1.4. Software Customers
4.1.5. Thick or Thin . . . or Smart?
4.1.6. Thin or Web-applications Customers
4.1.7. Smart Customers
4.1.8. Personal Cloud
4.1.9. Virtual Private Cloud
4.2. Cloud-storage Prerequisites
4.3. Cloud OS Prerequisites
4.4. Memory Prerequisites
4.5. CPU Prerequisites
4.6. Software Prerequisites
Chapter 5: Cloud Computing Security Essentials
5.1. Cloud Computing Definition
5.2. Cloud Computing Security Essentials
5.3. Dividing Operational Responsibilities
5.4. User-data Boundary
5.5. Ecosystem Orchestration Boundary
5.6. Deployment Boundary
5.7. Defining Your Root of Trust
5.8. Managing User Authentication and Authorization
Chapter 6: Cloud Security
6.1. The State of Cloud Security
6.2. Understanding the Threats
6.3. Classification and Countermeasures
6.3.1. Recruitment and Host Threats
6.3.2. Network Breaks
6.3.3. Lock-in
6.4. Compliance Issues
6.5. Infrastructure Modifications
6.6. Data Processing
6.7. Administrative and Assets
6.8. DoS
6.9. Service Provider
6.10. Information Interception
6.11. Clients’ Negligence and Cloud Security
6.12. Reduction of Governance
6.13. Common Risks
6.14. Encryption Keys
6.15. Service Engine Presence
About the author
Index
Ad page
Back Cover


πŸ“œ SIMILAR VOLUMES


Data security in cloud computing
✍ Kumar, Vimal πŸ“‚ Library πŸ“… 2017 πŸ› The Institution of Engineering and Technology 🌐 English

This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.</div>

Security and Data Storage Aspect in Clou
✍ Prachi S. Deshpande, Subhash C. Sharma, Sateesh K. Peddoju πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p>This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a networ

Security and Privacy Trends in Cloud Com
✍ Muhammad Imran Tariq, Valentina Emilia Balas, Shahzadi Tayyaba πŸ“‚ Library πŸ“… 2022 πŸ› CRC Press 🌐 English

<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig

Secure Compressive Sensing in Multimedia
✍ Yushu Zhang, Yong Xiang, Leo Yu Zhang πŸ“‚ Library πŸ“… 2019 πŸ› Springer Singapore 🌐 English

<p>This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and

Data Security in Cloud Storage
✍ Yuan Zhang; Chunxiang Xu; Xuemin Sherman Shen πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud stora