Book description
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Foreword
- Preface
- Acknowledgments
- The Editor
- Contributors
- SECTION I Introduction
- SECTION II Risk Analysis and Division of Responsibility
-
SECTION III Securing the Cloud Infrastructure
- CHAPTER 10 ■ Specification and Enforcement of Access Policies in Emerging Scenarios
- CHAPTER 11 ■ Cryptographic Key Management for Data Protection
- CHAPTER 12 ■ Cloud Security Access Control: Distributed Access Control
- CHAPTER 13 ■ Cloud Security Key Management: Cloud User Controls
- CHAPTER 14 ■ Cloud Computing Security Essentials and Architecture
- CHAPTER 15 ■ Cloud Computing Architecture and Security Concepts
- CHAPTER 16 ■ Secure Cloud Architecture
- SECTION IV Operating System and Network Security
-
SECTION V Meeting Compliance Requirements
- CHAPTER 19 ■ Negotiating Cloud Security Requirements with Vendors
- CHAPTER 20 ■ Managing Legal Compliance Risk in the Cloud and Negotiating Personal Data Protection Requirements with Vendors
- CHAPTER 21 ■ Integrity Assurance for Data Outsourcing
- CHAPTER 22 ■ Secure Computation Outsourcing
- CHAPTER 23 ■ Computation Over Encrypted Data
- CHAPTER 24 ■ Trusted Computing Technology
- CHAPTER 25 ■ Computing Technology for Trusted Cloud Security
- CHAPTER 26 ■ Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems
- CHAPTER 27 ■ Assuring Compliance with Government Certification and Accreditation Regulations
- CHAPTER 28 ■ Government Certification, Accreditation, Regulations, and Compliance Risks
- SECTION VI Preparing for Disaster Recovery
- SECTION VII Advanced Cloud Computing Security
- APPENDIX A: LIST OF TOP CLOUD COMPUTING SECURITY IMPLEMENTATION AND DEPLOYMENT COMPANIES
- APPENDIX B: LIST OF CLOUD COMPUTING SECURITY PRODUCTS AND SERVICES
- INDEX
Product information
- Title: Cloud Computing Security
- Author(s):
- Release date: September 2016
- Publisher(s): CRC Press
- ISBN: 9781315354927
You might also like
book
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Product Description Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows …
book
Cloud Computing Security, 2nd Edition
Overview of cloud computing security technology and implementation. Explores practical solutions to a wide range of …
book
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, …
book
Cloud security
This lesson is for engineers and cloud architects designing and planning cloud infrastructure security. It covers …