Cloud computing security foundations and challenges
This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper secur...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
CRC Press, Taylor & Francis Group
2021.
|
Edición: | Second edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009644275706719 |
Tabla de Contenidos:
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Foreword
- Preface
- Acknowledgments
- About the Editor
- Contributors
- Section I Introduction
- Chapter 1 Cloud Computing Essentials
- 1.1 Introduction to Cloud Computing
- 1.2 Characteristics of Cloud Computing
- 1.3 Cloud Computing Models
- 1.3.1 Service Models
- 1.3.1.1 Infrastructure-as-a-Service
- 1.3.1.2 Platform-as-a-Service
- 1.3.1.3 Software-as-a-Service
- 1.3.2 Deployment Models
- 1.4 Cloud Services and Technologies
- 1.5 Research Challenges
- 1.6 Summary
- Further Reading
- 2.7 ITU-T Cloud Computing Reference Architecture
- 2.7.1 Cloud Computing Actors
- 2.7.2 Layered Architecture
- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture
- 2.8 Network Requirements for Cloud Computing
- 2.9 Summary
- References
- Chapter 3 Cloud Security Baselines
- 3.1 Introduction
- 3.2 An Overview of Computer Security
- 3.3 Vulnerabilities and Attacks
- 3.3.1 Application Layer
- 3.3.2 Operating System Layer
- 3.3.3 Hypervisor, Storage, Hardware, and Network
- 3.3.4 Cloud Security Mechanisms
- 3.3.4.1 Data Security
- 3.3.4.2 Digital Signature
- 3.3.4.3 Hashing
- 3.3.5 Virtualization Security
- 3.4 Privacy and Security in Cloud Storage Services
- 3.4.1 Cloud Data Protection Models
- 3.4.2 Enforcing Access Control Policies in the Cloud
- 3.4.3 Other Possible Causes of Data Leakage in the Cloud
- 3.5 Privacy and Security in Multiclouds
- 3.5.1 Desired Security and Privacy Properties in Multiclouds
- 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds
- 3.6 Cloud Accountability
- 3.7 Summary
- References
- Chapter 4 Cloud Security, Privacy and Trust Baselines
- 4.1 Introduction
- 4.2 Understanding the Threats
- 4.3 Classification and Countermeasures
- 4.3.1 Infrastructure and Host Threats
- 4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure
- 4.3.1.2 Unauthorized Physical Access to Facilities or Equipment
- 4.3.1.3 Deficient Training/Negligence of Employees
- 4.3.1.4 Dumpster Diving
- 4.3.1.5 Password Guessing
- 4.3.1.6 Unauthorized Access to Data or Information Technology Systems
- 4.3.1.7 Compromise of Operational Security Logs
- 4.3.1.8 Network Breaks
- 4.3.1.9 Privilege Escalation
- 4.3.1.10 Insecure or Ineffective Data Deletion
- 4.3.1.11 Malicious Scanning or Observation