Description |
1 online resource |
Series |
Springer Briefs in computer science |
|
SpringerBriefs in computer science.
|
Contents |
Abstract; Preface; References; Contents; Chapter 1: Cloud Environment Security Landscape; 1.1 Cloud Computing Model Background; 1.2 Cloud Service Models; 1.3 Deployment Models; 1.4 Cloud Storage Classification; 1.4.1 Corporate Cloud Storage Types; 1.4.2 Corporate Cloud Storage Components; 1.4.3 Centralization Features; 1.4.4 Basic Scenarios; 1.5 Cloud Security Requirements; 1.5.1 Top Cloud Security Threats; 1.5.2 Cloud Security Requirements Recommendation; References; Chapter 2: Common Cloud Attacks and€Vulnerabilities; 2.1 Types of€Attacks in€Cloud Systems |
|
2.2 Classification of€Attacks According to€General Security Mechanisms2.3 Classification of€Vulnerabilities According to€General Security Mechanisms; 2.4 Threats Applied to€Cloud Solutions; 2.5 Classification of€Threats According to€General Security Mechanisms; 2.6 Adversary Types Related to€Cloud Solution Providers; References; Chapter 3: Cloud Storage Security Mechanisms; 3.1 Authentication and€Tokenization; 3.1.1 Definition and€Specific Characteristics; 3.1.2 Types of€Authentication; 3.1.3 Usage of€Tokens in€the€Cloud Storage; 3.2 Key Distribution and€Data Encryption |
|
3.2.1 Encryption in€the€Cloud3.2.2 Additional Methods; 3.2.3 Key Distribution; 3.2.4 Key Storing and€Using; 3.3 Authorization and€Access Control Support; 3.3.1 Definition and€Implementation of€Access Control; 3.3.2 Access Control Models and€Policies; 3.3.3 Access Control Methods; 3.3.4 Key Renewal and€Revocation; 3.3.5 Authorization Vulnerabilities, Attacks, and€Requirements; 3.4 Threat Intelligence; 3.5 Cloud Storage Component Security; 3.5.1 Server-Side Protection; 3.5.2 Client-Side Protection; 3.5.3 Mobile Device Protection; 3.5.4 Channel Protection Mechanisms; References |
|
Chapter 4: Cloud Storage Security Architecture4.1 General Model of€the€Security System; 4.2 Step-by-Step Security System Construction; 4.3 Identification of€the€Identity Management Infrastructure; 4.3.1 Formal Model of€Identity Management Infrastructure; 4.3.2 Types of€IMI in€Relation to€Cloud Storages; 4.3.3 Proposed Authentication Solutions; 4.4 Identification of€Access Control Framework; 4.4.1 Setting Up€Security Policies; 4.4.2 Configuring the€Data Encryption; 4.4.3 Configuring Key Management; 4.5 Identification of€Threat Intelligence Unit |
|
4.6 Identification of€the€Component Security Framework4.6.1 The Basic Strategies to€Organize the€Server Protected Storage; 4.6.2 The Basic Strategies to€Secure the€Client Application; 4.7 Security Optimization and€Verification; 4.7.1 Attack Prevention Verification; 4.7.2 Component Security Testing; 4.7.3 Security Optimization; 4.8 The Practical Implementation; References; Afterword; Reference |
Summary |
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system |
Bibliography |
Includes bibliographical references |
Notes |
Print version record |
Subject |
Cloud computing -- Security measures
|
|
Data protection.
|
|
Data encryption.
|
|
Computer security.
|
|
Network hardware.
|
|
COMPUTERS -- Computer Literacy.
|
|
COMPUTERS -- Computer Science.
|
|
COMPUTERS -- Data Processing.
|
|
COMPUTERS -- Hardware -- General.
|
|
COMPUTERS -- Information Technology.
|
|
COMPUTERS -- Machine Theory.
|
|
COMPUTERS -- Reference.
|
|
COMPUTERS -- Cloud Computing.
|
|
Data protection
|
Form |
Electronic book
|
Author |
Galibus, Tatiana
|
|
Krasnoproshin, Viktor V
|
|
Albuquerque, Robson de Oliveira
|
|
Pignaton de Freitas, Edison
|
ISBN |
9783319449623 |
|
3319449621 |
|