This one-stop reference covers a wide range of issues on data security in Cloud Computing ranging from accountability, to data provenance, identity and risk management.</div>
Data Security in Cloud Computing, Volume I
β Scribed by Giulio D'Agostino
- Publisher
- Momentum Press
- Year
- 2019
- Tongue
- English
- Leaves
- 153
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud.
Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more.
Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The bookΒs content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.
β¦ Table of Contents
Cover
DATA SECURITY IN CLOUD COMPUTING, VOLUME I
Contents
List of Figures
List of Tables
List of Abbreviations
Acknowledgments
Introduction
Chapter 1: Cloud Computing Essentials
1.1. Infrastructure-as-a-Service
1.2. Platform-as-a-Service
1.3. Software-as-a-Service
1.4. Deployment Designs
Chapter 2: Overview of Cloud Computing
2.1. Essential Characteristics
2.2. Cloud Services
2.3. Platform-as-a-Service and IaaS
2.4. Additional Cloud Services
2.5. XaaS (Anything-as-a-Service)
2.6. Public Cloud
2.7. Personal Cloud
2.8. Community Cloud
2.9. Hybrid
2.10. Cloud Provider Architectural Components
2.11. ITU-T Cloud Computing Reference Architecture
2.11.1. Cloud Computing βActorsβ
2.11.2. Layered Architecture
Chapter 3: Cloud Security Baselines
3.1. Fundamentals
3.2. Program Layer
3.3. Other Potential Reasons for Data Leakage from the Cloud
3.4. Privacy and Security in Multiclouds
3.5. Cloud Accountability
Chapter 4: Cloud Computing Architecture
4.1. Hardware Customers
4.1.1. Thick Clients
4.1.2. Thin Clients
4.1.3. Smartphones
4.1.4. Software Customers
4.1.5. Thick or Thin . . . or Smart?
4.1.6. Thin or Web-applications Customers
4.1.7. Smart Customers
4.1.8. Personal Cloud
4.1.9. Virtual Private Cloud
4.2. Cloud-storage Prerequisites
4.3. Cloud OS Prerequisites
4.4. Memory Prerequisites
4.5. CPU Prerequisites
4.6. Software Prerequisites
Chapter 5: Cloud Computing Security Essentials
5.1. Cloud Computing Definition
5.2. Cloud Computing Security Essentials
5.3. Dividing Operational Responsibilities
5.4. User-data Boundary
5.5. Ecosystem Orchestration Boundary
5.6. Deployment Boundary
5.7. Defining Your Root of Trust
5.8. Managing User Authentication and Authorization
Chapter 6: Cloud Security
6.1. The State of Cloud Security
6.2. Understanding the Threats
6.3. Classification and Countermeasures
6.3.1. Recruitment and Host Threats
6.3.2. Network Breaks
6.3.3. Lock-in
6.4. Compliance Issues
6.5. Infrastructure Modifications
6.6. Data Processing
6.7. Administrative and Assets
6.8. DoS
6.9. Service Provider
6.10. Information Interception
6.11. Clientsβ Negligence and Cloud Security
6.12. Reduction of Governance
6.13. Common Risks
6.14. Encryption Keys
6.15. Service Engine Presence
About the author
Index
Ad page
Back Cover
π SIMILAR VOLUMES
<p>This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a networ
<p><span>It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage, hig
<p>This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and
This book provides a comprehensive overview of data security in cloud storage, ranging from basic paradigms and principles, to typical security issues and practical security solutions. It also illustrates how malicious attackers benefit from the compromised security of outsourced data in cloud stora