Elements of cloud storage security : concepts, designs and optimized practices /: concepts, designs and optimized practices. ([2016])
- Record Type:
- Book
- Title:
- Elements of cloud storage security : concepts, designs and optimized practices /: concepts, designs and optimized practices. ([2016])
- Main Title:
- Elements of cloud storage security : concepts, designs and optimized practices
- Further Information:
- Note: Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas.
- Other Names:
- Galibus, Tatiana
Krasnoproshin, Viktor V
Albuquerque, Robson de Oliveira
Pignaton de Freitas, Edison - Contents:
- Abstract; Preface; References; Contents; Chapter 1: Cloud Environment Security Landscape; 1.1 Cloud Computing Model Background; 1.2 Cloud Service Models; 1.3 Deployment Models; 1.4 Cloud Storage Classification; 1.4.1 Corporate Cloud Storage Types; 1.4.2 Corporate Cloud Storage Components; 1.4.3 Centralization Features; 1.4.4 Basic Scenarios; 1.5 Cloud Security Requirements; 1.5.1 Top Cloud Security Threats; 1.5.2 Cloud Security Requirements Recommendation; References; Chapter 2: Common Cloud Attacks and€Vulnerabilities; 2.1 Types of€Attacks in€Cloud Systems. 2.2 Classification of€Attacks According to€General Security Mechanisms2.3 Classification of€Vulnerabilities According to€General Security Mechanisms; 2.4 Threats Applied to€Cloud Solutions; 2.5 Classification of€Threats According to€General Security Mechanisms; 2.6 Adversary Types Related to€Cloud Solution Providers; References; Chapter 3: Cloud Storage Security Mechanisms; 3.1 Authentication and€Tokenization; 3.1.1 Definition and€Specific Characteristics; 3.1.2 Types of€Authentication; 3.1.3 Usage of€Tokens in€the€Cloud Storage; 3.2 Key Distribution and€Data Encryption. 3.2.1 Encryption in€the€Cloud3.2.2 Additional Methods; 3.2.3 Key Distribution; 3.2.4 Key Storing and€Using; 3.3 Authorization and€Access Control Support; 3.3.1 Definition and€Implementation of€Access Control; 3.3.2 Access Control Models and€Policies; 3.3.3 Access Control Methods; 3.3.4 Key Renewal and€Revocation; 3.3.5 Authorization Vulnerabilities,Abstract; Preface; References; Contents; Chapter 1: Cloud Environment Security Landscape; 1.1 Cloud Computing Model Background; 1.2 Cloud Service Models; 1.3 Deployment Models; 1.4 Cloud Storage Classification; 1.4.1 Corporate Cloud Storage Types; 1.4.2 Corporate Cloud Storage Components; 1.4.3 Centralization Features; 1.4.4 Basic Scenarios; 1.5 Cloud Security Requirements; 1.5.1 Top Cloud Security Threats; 1.5.2 Cloud Security Requirements Recommendation; References; Chapter 2: Common Cloud Attacks and€Vulnerabilities; 2.1 Types of€Attacks in€Cloud Systems. 2.2 Classification of€Attacks According to€General Security Mechanisms2.3 Classification of€Vulnerabilities According to€General Security Mechanisms; 2.4 Threats Applied to€Cloud Solutions; 2.5 Classification of€Threats According to€General Security Mechanisms; 2.6 Adversary Types Related to€Cloud Solution Providers; References; Chapter 3: Cloud Storage Security Mechanisms; 3.1 Authentication and€Tokenization; 3.1.1 Definition and€Specific Characteristics; 3.1.2 Types of€Authentication; 3.1.3 Usage of€Tokens in€the€Cloud Storage; 3.2 Key Distribution and€Data Encryption. 3.2.1 Encryption in€the€Cloud3.2.2 Additional Methods; 3.2.3 Key Distribution; 3.2.4 Key Storing and€Using; 3.3 Authorization and€Access Control Support; 3.3.1 Definition and€Implementation of€Access Control; 3.3.2 Access Control Models and€Policies; 3.3.3 Access Control Methods; 3.3.4 Key Renewal and€Revocation; 3.3.5 Authorization Vulnerabilities, Attacks, and€Requirements; 3.4 Threat Intelligence; 3.5 Cloud Storage Component Security; 3.5.1 Server-Side Protection; 3.5.2 Client-Side Protection; 3.5.3 Mobile Device Protection; 3.5.4 Channel Protection Mechanisms; References. Chapter 4: Cloud Storage Security Architecture4.1 General Model of€the€Security System; 4.2 Step-by-Step Security System Construction; 4.3 Identification of€the€Identity Management Infrastructure; 4.3.1 Formal Model of€Identity Management Infrastructure; 4.3.2 Types of€IMI in€Relation to€Cloud Storages; 4.3.3 Proposed Authentication Solutions; 4.4 Identification of€Access Control Framework; 4.4.1 Setting Up€Security Policies; 4.4.2 Configuring the€Data Encryption; 4.4.3 Configuring Key Management; 4.5 Identification of€Threat Intelligence Unit. 4.6 Identification of€the€Component Security Framework4.6.1 The Basic Strategies to€Organize the€Server Protected Storage; 4.6.2 The Basic Strategies to€Secure the€Client Application; 4.7 Security Optimization and€Verification; 4.7.1 Attack Prevention Verification; 4.7.2 Component Security Testing; 4.7.3 Security Optimization; 4.8 The Practical Implementation; References; Afterword; Reference. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource
- Subjects:
- 004.67/82
Computer science
Cloud computing -- Security measures
Data protection
COMPUTERS -- Computer Literacy
COMPUTERS -- Computer Science
COMPUTERS -- Data Processing
COMPUTERS -- Hardware -- General
COMPUTERS -- Information Technology
COMPUTERS -- Machine Theory
COMPUTERS -- Reference
COMPUTERS -- Cloud Computing
Data protection
Computer Science
Computer Communication Networks
Data Encryption
Systems and Data Security
Computers -- Security -- General
Data encryption
Computer security
Computer Communication Networks
Data encryption (Computer science)
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books - Languages:
- English
- ISBNs:
- 9783319449623
3319449621 - Related ISBNs:
- 9783319449616
3319449613 - Notes:
- Note: Includes bibliographical references.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.347945
- Ingest File:
- 01_302.xml