O'Reilly logo

Cloud Computing: Concepts, Technology & Architecture by Zaigham Mahmood, Thomas Erl, Ricardo Puttini

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Cloud Security Mechanisms

Image

10.1 Encryption

10.2 Hashing

10.3 Digital Signature

10.4 Public Key Infrastructure (PKI)

10.5 Identity and Access Management (IAM)

10.6 Single Sign-On (SSO)

10.7 Cloud-Based Security Groups

10.8 Hardened Virtual Server Images

This chapter establishes a set of fundamental cloud security mechanisms, several of which can be used to counter the security threats described in Chapter 6.

10.1. Encryption

Data, by default, is coded in a readable format known as plaintext. When transmitted over a network, plaintext is vulnerable to unauthorized and potentially malicious access. The encryption mechanism is a digital ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required