Cloud Computing Security, 2nd Edition

Book description

Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of cloud computing security issues. Chapetrs by leading experts in the field address immediate and long-term challenges cloud computing security.

Table of contents

  1. Cover
  2. Half-Title
  3. Title
  4. Copyright
  5. Dedication
  6. Contents
  7. Foreword
  8. Preface
  9. Acknowledgments
  10. About the Editor
  11. Contributors
  12. SECTION I Introduction
    1. CHAPTER 1 CLOUD COMPUTING ESSENTIALS
    2. CHAPTER 2 AN OVERVIEW OF CLOUD COMPUTING
    3. CHAPTER 3 CLOUD SECURITY BASELINES
    4. CHAPTER 4 CLOUD SECURITY, PRIVACY AND TRUST BASELINES
    5. CHAPTER 5 INFRASTRUCTURE AS A SERVICE (IAAS)
  13. SECTION II Risk Analysis and Division of Responsibility
    1. CHAPTER 6 RISK AND TRUST ASSESSMENT: SCHEMES FOR CLOUD SERVICES
    2. CHAPTER 7 MANAGING RISK IN THE CLOUD
    3. CHAPTER 8 CLOUD SECURITY RISK MANAGEMENT
    4. CHAPTER 9 SECURE CLOUD RISK MANAGEMENT: RISK MITIGATION METHODS
  14. SECTION III Securing the Cloud Infrastructure
    1. CHAPTER 10 SPECIFICATION AND ENFORCEMENT OF ACCESS POLICIES IN EMERGING SCENARIOS
    2. CHAPTER 11 CRYPTOGRAPHIC KEY MANAGEMENT FOR DATA PROTECTION
    3. CHAPTER 12 CLOUD SECURITY ACCESS CONTROL: DISTRIBUTED ACCESS CONTROL
    4. CHAPTER 13 CLOUD SECURITY KEY MANAGEMENT: CLOUD USER CONTROLS
    5. CHAPTER 14 CLOUD COMPUTING SECURITY ESSENTIALS AND ARCHITECTURE
    6. CHAPTER 15 CLOUD COMPUTING ARCHITECTURE AND SECURITY CONCEPTS
    7. CHAPTER 16 SECURE CLOUD ARCHITECTURE
  15. SECTION IV Operating System and Network Security
    1. CHAPTER 17 LOCKING DOWN CLOUD SERVERS
    2. CHAPTER 18 THIRD-PARTY PROVIDERS INTEGRITY ASSURANCE FOR DATA OUTSOURCING
  16. SECTION V Meeting Compliance Requirements
    1. CHAPTER 19 NEGOTIATING CLOUD SECURITY REQUIREMENTS WITH VENDORS
    2. CHAPTER 20 MANAGING LEGAL COMPLIANCE IN THE CLOUD: UNDERSTANDING CONTRACTUAL AND PERSONAL DATA PROTECTION REQUIREMENTS
    3. CHAPTER 21 INTEGRITY ASSURANCE FOR DATA OUTSOURCING
    4. CHAPTER 22 SECURE COMPUTATION OUTSOURCING
    5. CHAPTER 23 COMPUTATION OVER ENCRYPTED DATA
    6. CHAPTER 24 TRUSTED COMPUTING TECHNOLOGY
    7. CHAPTER 25 TECHNOLOGY FOR TRUSTED CLOUD SECURITY: SURVEY AND OPEN ISSUES
    8. CHAPTER 26 TRUSTED COMPUTING TECHNOLOGY AND PROPOSALS FOR RESOLVING CLOUD COMPUTING SECURITY PROBLEMS
    9. CHAPTER 27 ASSURING COMPLIANCE WITH GOVERNMENT CERTIFICATION AND ACCREDITATION REGULATIONS
    10. CHAPTER 28 GOVERNMENT CERTIFICATION, ACCREDITATION, REGULATIONS, AND COMPLIANCE RISKS
  17. SECTION VI Preparing for Disaster Recovery
    1. CHAPTER 29 SIMPLIFYING SECURE CLOUD COMPUTING ENVIRONMENTS WITH CLOUD DATA CENTERS
    2. CHAPTER 30 AVAILABILITY, RECOVERY, AND AUDITING ACROSS DATA CENTERS
  18. SECTION VII Advanced Cloud Computing Security
    1. CHAPTER 31 ADVANCED SECURITY ARCHITECTURE FOR CLOUD COMPUTING
    2. CHAPTER 32 SIDE-CHANNEL ATTACKS AND DEFENSES ON CLOUD TRAFFIC
    3. CHAPTER 33 CLOUDS ARE EVIL
    4. CHAPTER 34 FUTURE DIRECTIONS IN CLOUD COMPUTING SECURITY: RISKS AND CHALLENGES
  19. SECTION VIII Appendices
  20. APPENDIX A: LIST OF TOP CLOUD COMPUTING SECURITY IMPLEMENTATION AND DEPLOYMENT COMPANIES
  21. APPENDIX B: LIST OF CLOUD COMPUTING SECURITY PRODUCTS AND SERVICES
  22. INDEX

Product information

  • Title: Cloud Computing Security, 2nd Edition
  • Author(s): John R. Vacca
  • Release date: November 2020
  • Publisher(s): CRC Press
  • ISBN: 9780429619649