Cloud computing security foundations and challenges

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper secur...

Descripción completa

Detalles Bibliográficos
Otros Autores: Vacca, John R., editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, Taylor & Francis Group 2021.
Edición:Second edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009644275706719
Tabla de Contenidos:
  • Cover
  • Half Title
  • Title Page
  • Copyright Page
  • Dedication
  • Table of Contents
  • Foreword
  • Preface
  • Acknowledgments
  • About the Editor
  • Contributors
  • Section I Introduction
  • Chapter 1 Cloud Computing Essentials
  • 1.1 Introduction to Cloud Computing
  • 1.2 Characteristics of Cloud Computing
  • 1.3 Cloud Computing Models
  • 1.3.1 Service Models
  • 1.3.1.1 Infrastructure-as-a-Service
  • 1.3.1.2 Platform-as-a-Service
  • 1.3.1.3 Software-as-a-Service
  • 1.3.2 Deployment Models
  • 1.4 Cloud Services and Technologies
  • 1.5 Research Challenges
  • 1.6 Summary
  • Further Reading
  • 2.7 ITU-T Cloud Computing Reference Architecture
  • 2.7.1 Cloud Computing Actors
  • 2.7.2 Layered Architecture
  • 2.7.3 ITU-T Cloud Computing Functional Reference Architecture
  • 2.8 Network Requirements for Cloud Computing
  • 2.9 Summary
  • References
  • Chapter 3 Cloud Security Baselines
  • 3.1 Introduction
  • 3.2 An Overview of Computer Security
  • 3.3 Vulnerabilities and Attacks
  • 3.3.1 Application Layer
  • 3.3.2 Operating System Layer
  • 3.3.3 Hypervisor, Storage, Hardware, and Network
  • 3.3.4 Cloud Security Mechanisms
  • 3.3.4.1 Data Security
  • 3.3.4.2 Digital Signature
  • 3.3.4.3 Hashing
  • 3.3.5 Virtualization Security
  • 3.4 Privacy and Security in Cloud Storage Services
  • 3.4.1 Cloud Data Protection Models
  • 3.4.2 Enforcing Access Control Policies in the Cloud
  • 3.4.3 Other Possible Causes of Data Leakage in the Cloud
  • 3.5 Privacy and Security in Multiclouds
  • 3.5.1 Desired Security and Privacy Properties in Multiclouds
  • 3.5.2 Ensuring Security, Privacy, and Reliability in Multiclouds
  • 3.6 Cloud Accountability
  • 3.7 Summary
  • References
  • Chapter 4 Cloud Security, Privacy and Trust Baselines
  • 4.1 Introduction
  • 4.2 Understanding the Threats
  • 4.3 Classification and Countermeasures
  • 4.3.1 Infrastructure and Host Threats
  • 4.3.1.1 Natural Disasters That Can Harm Critical Infrastructure
  • 4.3.1.2 Unauthorized Physical Access to Facilities or Equipment
  • 4.3.1.3 Deficient Training/Negligence of Employees
  • 4.3.1.4 Dumpster Diving
  • 4.3.1.5 Password Guessing
  • 4.3.1.6 Unauthorized Access to Data or Information Technology Systems
  • 4.3.1.7 Compromise of Operational Security Logs
  • 4.3.1.8 Network Breaks
  • 4.3.1.9 Privilege Escalation
  • 4.3.1.10 Insecure or Ineffective Data Deletion
  • 4.3.1.11 Malicious Scanning or Observation