๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Guide to Security Assurance for Cloud Computing

โœ Scribed by Shao Ying Zhu, Richard Hill, Marcello Trovati (eds.)


Publisher
Springer International Publishing
Year
2015
Tongue
English
Leaves
240
Series
Computer Communications and Networks
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tools, techniques and deployment models in this field. Enlightening perspectives are presented by an international collection of pre-eminent authorities in cloud security assurance from both academia and industry.

Topics and features:

ยท Describes the important general concepts and principles of security assurance in cloud-based environments

ยท Presents applications and approaches to cloud security that illustrate the current state of the art

ยท Reviews pertinent issues in relation to challenges that prevent organizations moving to cloud architectures

ยท Provides relevant theoretical frameworks and the latest empirical research findings

ยท Discusses real-world vulnerabilities of cloud-based software in order to address the challenges of securing distributed software

ยท Highlights the practicalities of cloud security, and how applications can assure and comply with legislation

ยท Includes review questions at the end of each chapter

This Guide to Security Assurance for Cloud Computing will be of great benefit to a broad audience covering enterprise architects, business analysts and leaders, IT infrastructure managers, cloud security engineers and consultants, and application developers involved in system design and implementation. The work is also suitable as a textbook for university instructors, with the outline for a possible course structure suggested in the preface.

The editors are all members of the Computing and Mathematics Department at the University of Derby, UK, where Dr. Shao Ying Zhu serves as a Senior Lecturer in Computing, Dr. Richard Hill as a Professor and Head of the Computing and Mathematics Department, and Dr. Marcello Trovati as a Senior Lecturer in Mathematics. The other publications of the editors include the Springer titles Big-Data Analytics and Cloud Computing, Guide to Cloud Computing and Cloud Computing for Enterprise Architectures.


โœฆ Table of Contents


Front Matter....Pages i-xviii
Front Matter....Pages 1-1
Privacy, Compliance and the Cloud....Pages 3-14
Cryptographic Tools for Cloud Environments....Pages 15-30
Migrating to Public Clouds โ€“ From a Security Perspective....Pages 31-50
Virtualization Security in Cloud Computing....Pages 51-63
Security of Cloud-Based Storage....Pages 65-81
Cloud Computing Governance, Risk, and Compliance โ€“ The Quintessential Globalization Challenge....Pages 83-93
Cloud Computing and Security in the Future....Pages 95-108
Front Matter....Pages 109-109
Security Certification for the Cloud: The CUMULUS Approach....Pages 111-137
Improving Cloud Assurance and Transparency Through Accountability Mechanisms....Pages 139-169
DDoS Protection and Security Assurance in Cloud....Pages 171-191
Cloud Data Auditing Using Proofs of Retrievability....Pages 193-210
Vehicular Cloud Networks: Architecture and Security....Pages 211-226
Back Matter....Pages 227-229

โœฆ Subjects


Systems and Data Security; Computer Communication Networks; Management of Computing and Information Systems


๐Ÿ“œ SIMILAR VOLUMES


Cloud Security: A Comprehensive Guide to
โœ Ronald L. Krutz, Russell Dean Vines ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› Wiley ๐ŸŒ English

Well-known security experts decipher the most challenging aspect of cloud computing-securityCloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-a

CSA Guide to Cloud Computing : Implement
โœ Raj Samani; Jim Reavis; Brian Honan ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Syngress ๐ŸŒ English

<p><i>CSA Guide to Cloud Computing</i> brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA).</p><p>For many years the CSA has been at the forefront of research and analysis in

Assured cloud computing
โœ Campbell, Roy Harold; Kamhoua, Charles A.; Kwiat, Kevin A ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› IEEE Computer Society ๐ŸŒ English

Explores themes that drive individual contributions, including design correctness, support for big data and analytics, monitoring and detection, network considerations, and performance - Synthesizes highly cited earlier work (on topics including DARE, trust mechanisms, and elastic graphs) as well as

Privacy and Security for Cloud Computing
โœ Siani Pearson (auth.), Siani Pearson, George Yee (eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer-Verlag London ๐ŸŒ English

<p>This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics a