Cloud.Computing.Security.Foundations.and.Challenges

上传:zhanglin73346197 浏览: 45 推荐: 0 文件:PDF 大小:43.07MB 上传时间:2018-12-14 13:51:04 版权申诉
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered withi n one reference guide. Table of Contents SECTION I: Introduction CHAPTER 2: Overview of Cloud Computing CHAPTER 3: Cloud Security Baselines CHAPTER 4: Cloud Security, Privacy, and Trust Baselines CHAPTER 5: Infrastructure as a Service (IaaS) SECTION II: Risk Analysis and Division of Responsibility CHAPTER 7: Managing Risk in the Cloud CHAPTER 8: Cloud Security Risk Management CHAPTER 9: Secure Cloud Risk Management: Risk Mitigation Methods SECTION III: Securing the Cloud Infrastructure CHAPTER 11: Cryptographic Key Management for Data Protection CHAPTER 12: Cloud Security Access Control: Distributed Access Control CHAPTER 13: Cloud Security Key Management: Cloud User Controls CHAPTER 14: Cloud Computing Security Essentials and Architecture CHAPTER 15: Cloud Computing Architecture and Security Concepts CHAPTER 16: Secure Cloud Architecture SECTION IV: Operating System and Network Security CHAPTER 18: Third-Party Providers Integrity Assurance for Data Outsourcing SECTION V: Meeting Compliance Requirements CHAPTER 20: Managing Legal Compliance Risk in the Cloud and Negotiating Personal Data Protection Requirements with Vendors CHAPTER 21: Integrity Assurance for Data Outsourcing CHAPTER 22: Secure Computation Outsourcing CHAPTER 23: Computation Over Encrypted Data CHAPTER 24: Trusted Computing Technology CHAPTER 25: Computing Technology for Trusted Cloud Security CHAPTER 26: Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems CHAPTER 27: Assuring Compliance with Government Certification and Accreditation Regulations CHAPTER 28: Government Certification, Accreditation, Regulations, and Compliance Risks SECTION VI: Preparing for Disaster Recovery CHAPTER 30: Availability, Recovery, and Auditing across Data Centers SECTION VII: Advanced Cloud Computing Security CHAPTER 32: Side-Channel Attacks and Defenses on Cloud Traffic CHAPTER 33: Clouds Are Evil CHAPTER 34: Future Directions in Cloud Computing Security: Risks and Challenges
上传资源
用户评论