ABSTRACT

This handbook offers a comprehensive overview of cloud computing security technology and implementation while exploring practical solutions to a wide range of cloud computing security issues. As more organizations use cloud computing and cloud providers for data operations, the need for proper security in these and other potentially vulnerable areas has become a global priority for organizations of all sizes. Research efforts from academia and industry, as conducted and reported by experts in all aspects of security related to cloud computing, are gathered within one reference guide.

Features

• Covers patching and configuration vulnerabilities of a cloud server

• Evaluates methods for data encryption and long-term storage in a cloud server

• Demonstrates how to verify identity using a certificate chain and how to detect inappropriate changes to data or system configurations

 

John R. Vacca is an information technology consultant and internationally known author of more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. John was also a configuration management specialist, computer specialist, and the computer security official (CSO) for NASA’s space station program (Freedom) and the International Space Station Program from 1988 until his retirement from NASA in 1995.

part I|70 pages

Introduction

part II|56 pages

Risk Analysis and Division of Responsibility

chapter Chapter 6|12 pages

Risk and Trust Assessment

Schemes for Cloud Services

chapter Chapter 7|10 pages

Managing Risk in the Cloud

chapter Chapter 8|20 pages

Cloud Security Risk Management

chapter Chapter 9|12 pages

Secure Cloud Risk Management

Risk Mitigation Methods

part III|108 pages

Securing the Cloud Infrastructure

chapter Chapter 13|28 pages

Cloud Security Key Management

Cloud User Controls

chapter Chapter 16|10 pages

Secure Cloud Architecture

part IV|34 pages

Operating System and Network Security

chapter Chapter 17|18 pages

Locking Down Cloud Servers

part V|140 pages

Meeting Compliance Requirements

chapter Chapter 21|12 pages

Integrity Assurance for Data Outsourcing

chapter Chapter 22|18 pages

Secure Computation Outsourcing

chapter Chapter 23|18 pages

Computation Over Encrypted Data

chapter Chapter 24|10 pages

Trusted Computing Technology

part VI|32 pages

Preparing for Disaster Recovery

part VII|58 pages

Advanced Cloud Computing Security

chapter Chapter 33|12 pages

Clouds Are Evil

chapter Chapter 34|10 pages

Future Directions in Cloud Computing Security

Risks and Challenges