You are previewing Handbook of Research on Security Considerations in Cloud Computing.
O'Reilly logo
Handbook of Research on Security Considerations in Cloud Computing

Book Description

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Foreword
  7. Preface
    1. WHY CLOUD COMPUTING MATTERS?
    2. OBJECTIVE
    3. TARGET AUDIENCE
    4. APPROACH
  8. Acknowledgment
  9. Chapter 1: Security Issues in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SECURITY ISSUES IN CLOUD COMPUTING
    5. SUMMARY OF THE CHAPTER
    6. REFERENCES
    7. KEY TERMS AND DEFINITIONS
  10. Chapter 2: Cloud Computing Security
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. CONCLUSION
    5. REFERENCES
    6. KEY TERMS AND DEFINITIONS
  11. Chapter 3: Cloud Security Using Ear Biometrics
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. LITERATURE REVIEW
    4. 3. ISSUES AND CHALLENGES OF CLOUD COMPUTING SECURITY
    5. 4. CLOUD SECURITY
    6. 5. BIOMETRIC SYSTEM
    7. 6. EAR BIOMETRIC SYSTEM
    8. 7. CONCLUSION AND FUTURE DIRECTION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  12. Chapter 4: Secure Architecture for Cloud Environment
    1. ABSTRACT
    2. INTRODUCTION
    3. SECURITY CONCERNS OF CLOUD COMPUTING
    4. VULNERABILITIES IDENTIFIED IN CLOUD COMPUTING
    5. THREAT MODEL FOR CLOUD
    6. VULNERABILITIES IN CLOUD ENVIRONMENT
    7. THREATS TO CLOUD COMPUTING
    8. ATTACKS ON CLOUD COMPUTING
    9. SECURE CLOUD ARCHITECTURE
    10. SECURE PROTOCOL – A PROPOSAL
    11. SECURING CLOUD COMPUTING
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  13. Chapter 5: Governance and Risk Management in the Cloud with Cloud Controls Matrix V3 and ISO/IEC 385002008
    1. ABSTRACT
    2. INTRODUCTION
    3. MAIN FOCUS OF THE CHAPTER
    4. ESSENTIAL CHARACTERISTICS OF CLOUD COMPUTING
    5. CLOUD COMPUTING SERVICE MODELS
    6. CLOUD COMPUTING DEPLOYMENT MODELS
    7. CRITICAL AREAS OF FOCUS FOR A SECURED CLOUD ENVIRONMENT
    8. VIRTUALIZATION ROUTE TO THE CLOUD
    9. SECURITY RISKS IN VIRTUAL IT SYSTEMS
    10. GOVERNANCE AND RISK MANAGEMENT IN THE CLOUD: ROLE OF THE BOARD
    11. OVERVIEW OF GRM DOMAIN OF CSA CLOUD CONTROLS MATRIX V3 FRAMEWORK
    12. OVERVIEW OF ISO/IEC 38500:2008 STANDARD FOR IT GOVERNANCE
    13. “CLOUD GOVERNANCE MATRIX” FOR GOVERNANCE AND RISK MANAGEMENT
    14. DERIVING BENEFITS FROM THE CLOUD GOVERNANCE MATRIX
    15. CONCLUSION
    16. DEDICATION
    17. REFERENCES
    18. ADDITIONAL READING
    19. KEY TERMS AND DEFINITIONS
  14. Chapter 6: Authentication and Error Resilience in Images Transmitted through Open Environment
    1. ABSTRACT
    2. INTRODUCTION
    3. LITERATURE REVIEW
    4. PROPOSED APPROACH
    5. EXPERIMENTAL SETUP AND RESULTS
    6. COMPARATIVE DISCUSSION AND FUTURE DIRECTIONS
    7. STANDARDIZATION REVIEW
    8. CONCLUSION
    9. ACKNOWLEDGMENT
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  15. Chapter 7: Trust Calculation Using Fuzzy Logic in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. TRUST CALCULATION USING FUZZY LOGIC
    5. TRUST CALCULATION USING FUZZY LOGIC IN CLOUD COMPUTING
    6. COMPARISON OF DIFFERENT MODELS
    7. SUMMARY, CONCLUSION, AND FUTURE SCOPE
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  16. Chapter 8: Advances in Information, Security, Privacy & Ethics
    1. ABSTRACT
    2. INTRODUCTION
    3. CLOUD COMPUTING
    4. CYBER ATTACKS IN EDUCATION
    5. CLOUD COMPUTING EDUCATIONAL MODEL
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  17. Chapter 9: Networked Multimedia Communication Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. MULTIMEDIA COMMUNICATION
    4. MULTIMEDIA COMMUNICATION OVER NETWORKS
    5. MULTIMEDIA COMMUNICATION SYSTEM ARCHITECTURE
    6. AUDIO-VIDEO CONFERENCING
    7. MULTIMEDIA COMMUNICATION STANDARDS
    8. DISTRIBUTED MULTIMEDIA SYSTEMS
    9. SOME OF THE ADVANCE PROJECTS IN THE WORLD CREATING A REVOLUTION IN THE FIELD OF NETWORKED MULTIMEDIA SYSTEMS
    10. SUMMARY
    11. REFERENCES
    12. ADDITIONAL READING
    13. KEY TERMS AND DEFINITIONS
  18. Chapter 10: Data Security Issues and Solutions in Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. DATA SECURITY ISSUES
    4. DATA SECURITY SOLUTIONS
    5. PROPOSED SCHEME
    6. ANALYSIS AND COMPARISON
    7. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    8. REFERENCES
    9. ADDITIONAL READING
    10. KEY TERMS AND DEFINITIONS
    11. APPENDIX
  19. Chapter 11: Improving Privacy and Security in Multicloud Architectures
    1. ABSTRACT
    2. CLOUD SERVICE MODELS
    3. DATA INTEGRITY
    4. DATA INTRUSION
    5. ARCHITECTURES OF MULTICLOUD
    6. REPETITION OF APPLICATION
    7. PARTITION OF SYSTEM ARCHITECTURE INTO LAYERS
    8. PARTITION OF SECURITY FEATURES INTO SEGMENTS
    9. DISTRIBUTION OF DATA INTO FRAGMENTS
    10. LEGAL ACCEPTANCES WITH MULTICLOUD ARCHITECTURES
    11. ASSESSMENTS OF MULTICLOUD ARCHITECTURES
    12. CONCLUSION
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  20. Chapter 12: Hard Clues in Soft Environments
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. ISSUES IN CLOUD COMPUTING
    5. SOLUTIONS
    6. OPEN ISSUES
    7. FUTURE WORK
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  21. Chapter 13: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLOUD COMPUTING MODELS
    4. 3. BENEFITS OF CLOUD COMPUTING IN KSA
    5. 4. SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT
    6. 5. SECURITY REQUIREMENTS
    7. 6. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  22. Chapter 14: Big Data Security
    1. ABSTRACT
    2. INTRODUCTION
    3. SECURITY CHALLENGES IN BIG DATA CONTEXT
    4. BIG DATA SECURITY SOLUTIONS
    5. EXAMPLE: SECURITY OF SMART GRID BIG DATA
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  23. Chapter 15: Access Control Framework for Cloud Computing
    1. ABSTRACT
    2. INTRODUCTION
    3. HISTORY OF ACCESS CONTROL MODELS
    4. CODEWORDS
    5. RELATED WORK
    6. ROLE BASED ACCESS CONTROL (RBAC)
    7. PROPOSED FRAMEWORK
    8. SECURITY POLICIES
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  24. Chapter 16: Big Data
    1. ABSTRACT
    2. INTRODUCTION
    3. CHARACTERISTICS OF BIG DATA
    4. RELATED WORK
    5. DIMENSIONS OF GENERALIZED BIG DATA
    6. BIG DATA MODEL
    7. BIG DATA PROCESSING FRAMEWORK
    8. DATA MINING CHALLENGES WITH BIG DATA
    9. BIG DATA MINING PLATFORM
    10. SECURITY AND UNCERTAINTY ISSUES IN BIG DATA
    11. CONCLUSION
    12. SUMMARY
    13. REFERENCES
    14. KEY TERMS AND DEFINITIONS
  25. Chapter 17: Achieving Efficient Purging in Transparent per-file Secure Wiping Extensions
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND AND RELATED WORK
    4. DESIGN OF RESTFS FILESYSTEM
    5. IMPLEMENTATION OF RESTFS FILESYSTEM
    6. EXPERIMENT
    7. RESULTS AND DISCUSSION
    8. CONCLUSION
    9. REFERENCES
    10. KEY TERMS AND DEFINITIONS
  26. Chapter 18: Reliability, Fault Tolerance, and Quality-of-Service in Cloud Computing
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CLOUD COMPUTING ARCHITECTURE
    4. 3. TYPES OF CLOUDS
    5. 4. RELIABILITY AND FAULT-TOLERANCE
    6. 5. QUALITY OF SERVICE
    7. 6. CONCLUSION
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  27. Compilation of References
  28. About the Contributors