Limit search to available items
Book Cover
E-book

Title Elements of cloud storage security : concepts, designs and optimized practices / Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas
Published Cham, Switzerland : Springer, [2016]

Copies

Description 1 online resource
Series Springer Briefs in computer science
SpringerBriefs in computer science.
Contents Abstract; Preface; References; Contents; Chapter 1: Cloud Environment Security Landscape; 1.1 Cloud Computing Model Background; 1.2 Cloud Service Models; 1.3 Deployment Models; 1.4 Cloud Storage Classification; 1.4.1 Corporate Cloud Storage Types; 1.4.2 Corporate Cloud Storage Components; 1.4.3 Centralization Features; 1.4.4 Basic Scenarios; 1.5 Cloud Security Requirements; 1.5.1 Top Cloud Security Threats; 1.5.2 Cloud Security Requirements Recommendation; References; Chapter 2: Common Cloud Attacks and€Vulnerabilities; 2.1 Types of€Attacks in€Cloud Systems
2.2 Classification of€Attacks According to€General Security Mechanisms2.3 Classification of€Vulnerabilities According to€General Security Mechanisms; 2.4 Threats Applied to€Cloud Solutions; 2.5 Classification of€Threats According to€General Security Mechanisms; 2.6 Adversary Types Related to€Cloud Solution Providers; References; Chapter 3: Cloud Storage Security Mechanisms; 3.1 Authentication and€Tokenization; 3.1.1 Definition and€Specific Characteristics; 3.1.2 Types of€Authentication; 3.1.3 Usage of€Tokens in€the€Cloud Storage; 3.2 Key Distribution and€Data Encryption
3.2.1 Encryption in€the€Cloud3.2.2 Additional Methods; 3.2.3 Key Distribution; 3.2.4 Key Storing and€Using; 3.3 Authorization and€Access Control Support; 3.3.1 Definition and€Implementation of€Access Control; 3.3.2 Access Control Models and€Policies; 3.3.3 Access Control Methods; 3.3.4 Key Renewal and€Revocation; 3.3.5 Authorization Vulnerabilities, Attacks, and€Requirements; 3.4 Threat Intelligence; 3.5 Cloud Storage Component Security; 3.5.1 Server-Side Protection; 3.5.2 Client-Side Protection; 3.5.3 Mobile Device Protection; 3.5.4 Channel Protection Mechanisms; References
Chapter 4: Cloud Storage Security Architecture4.1 General Model of€the€Security System; 4.2 Step-by-Step Security System Construction; 4.3 Identification of€the€Identity Management Infrastructure; 4.3.1 Formal Model of€Identity Management Infrastructure; 4.3.2 Types of€IMI in€Relation to€Cloud Storages; 4.3.3 Proposed Authentication Solutions; 4.4 Identification of€Access Control Framework; 4.4.1 Setting Up€Security Policies; 4.4.2 Configuring the€Data Encryption; 4.4.3 Configuring Key Management; 4.5 Identification of€Threat Intelligence Unit
4.6 Identification of€the€Component Security Framework4.6.1 The Basic Strategies to€Organize the€Server Protected Storage; 4.6.2 The Basic Strategies to€Secure the€Client Application; 4.7 Security Optimization and€Verification; 4.7.1 Attack Prevention Verification; 4.7.2 Component Security Testing; 4.7.3 Security Optimization; 4.8 The Practical Implementation; References; Afterword; Reference
Summary This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system
Bibliography Includes bibliographical references
Notes Print version record
Subject Cloud computing -- Security measures
Data protection.
Data encryption.
Computer security.
Network hardware.
COMPUTERS -- Computer Literacy.
COMPUTERS -- Computer Science.
COMPUTERS -- Data Processing.
COMPUTERS -- Hardware -- General.
COMPUTERS -- Information Technology.
COMPUTERS -- Machine Theory.
COMPUTERS -- Reference.
COMPUTERS -- Cloud Computing.
Data protection
Form Electronic book
Author Galibus, Tatiana
Krasnoproshin, Viktor V
Albuquerque, Robson de Oliveira
Pignaton de Freitas, Edison
ISBN 9783319449623
3319449621