You are previewing Security Engineering for Cloud Computing.
O'Reilly logo
Security Engineering for Cloud Computing

Book Description

Applying software engineering to Cloud computing is a primary aspect to obtain a systematic approach to the development, operation and maintenance of software. As a result, there is a need to examine and propose security solutions for cloud computing in order to improve the quality and security of all services, applications, and tools based on cloud computing. Security Engineering for Cloud Computing: Approaches and Tools provides a theoretical and academic description of Cloud security issues, methods, tools and trends for developing secure software for Cloud services and applications. This book is a comprehensive collection including a wide range of existing problems and challenges that would be useful in both the academic and research world.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. EDITORIAL ADVISORY BOARD
    2. LIST OF REVIEWERS
  5. Foreword
  6. Preface
    1. CLOUD COMPUTING
    2. TYPES OF CLOUD MODELS
    3. SECURITY IN CLOUD COMPUTING
    4. SECURITY BENEFITS IN CLOUD COMPUTING
    5. AIMS OF THIS BOOK
  7. Section 1: Cloud Architecture and Patterns
    1. Chapter 1: Dynamic Security Properties Monitoring Architecture for Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. CONCLUSION
    2. Chapter 2: The SeCA Model
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RISKS AND THREATS IN THE CLOUD
      5. ENCRYPTION IN THE CLOUD
      6. THE SECA MODEL
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 3: Three Misuse Patterns for Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MISUSE PATTERNS FOR CLOUD COMPUTING
      5. CONCLUSION AND FUTURE WORK
  8. Section 2: Risks and Vulnerabilities in Cloud Computing
    1. Chapter 4: Security Risks in Cloud Computing
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. VULNERABILITIES ANALYSIS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    2. Chapter 5: A Software Tool to support Risks Analysis about what Should or Should Not go to the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURING SERVICES AND DIGITAL RESOURCES IN THE CLOUD IS MUCH MORE THAT ENCRYPTING AND FILTERING INFORMATION
      4. DIFFERENT MODELS OF CLOUDS PROVIDE DIFFERENT LEVELS OF SECURITY
      5. 2THECLOUD: A SOFTWARE TOOL THAT SUPPORTS THE ANALYSYS FOR CHOSING THE CLOUD TO USE
      6. 2THECLOUD: A SET OF REDUCED FUNCTIONS
      7. 2THECLOUD GENERAL PROCESS
      8. 2THE CLOUD STEP BY STEP
      9. USER’S METACOGNITIVE PROCESS THROUGHOUT 2THECLOUD
      10. STATISTICS AND DATA FILES GENERATED BY 2THECLOUD
      11. WHAT IS OFFERED BY 2THECLOUD
      12. 2THECLOUD RISKS ANALYSIS ATERNATIVES
      13. A PRIORI AND CALCULATED RISK APPROACH
      14. FUTURE RESEARCH DIRECTIONS
      15. CONCLUSION
    3. Chapter 6: A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND ABOUT RISK MANAGEMENT
      4. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING
      5. CLOUD COMPUTING COMPONENTS FOR RISK MANAGEMENT
      6. ILLUSTRATIVE EXAMPLE
      7. DISCUSSION
      8. CONCLUSION AND FURTHER RESEARCH DIRECTIONS
    4. Chapter 7: Real Time Risk Management in Cloud Computation
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY CHALLENGES IN CLOUD COMPUTING
      4. CYBER-ATTACKS ON CLOUD
      5. FUNDAMENTAL CLOUD SECURITY REQUIREMENTS
      6. RISK MANAGEMENT
      7. ASSESSING/AUDITING A CLOUD-BASED APPLICATION
      8. PROPOSED ASSESSING/AUDITING MODEL FOR CLOUD RISK MANAGEMENT
      9. CASE STUDY: CLOUD-BASED CLOVE TRIAGE APPLICATION
  9. Section 3: Hardware Security and Secure Storage and Policy Management in Cloud
    1. Chapter 8: Hardware-Based Security for Ensuring Data Privacy in the Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. SURVEY OF RESEARCH IN CLOUD SECURITY AND PRIVACY
      4. CRYPTOGRAPHIC COPROCESSORS: ARCHITECTURE, SECURITY, IMPLEMENTATIONS, AND APPLICATIONS
      5. A HARDWARE-BASED CLOUD PRIVACY SYSTEM
      6. SYSTEM IMPLEMENTATION
      7. SECURITY ANALYSIS
      8. ECONOMIC FEASIBILITY ANALYSIS
      9. CONCLUSION
    2. Chapter 9: Securing Cloud Storage
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. STORAGE VIRTUALIZATION APPLIED TO CLOUD COMPUTING
      5. CONCLUSION
    3. Chapter 10: Policy Management in Cloud
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. POLICY MANAGEMENT IN CLOUD
      5. CONCLUSION
  10. Compilation of References
  11. About the Contributors