3 options
Data security in cloud computing. Volume I / Giulio D'Agostino.
- Format:
- Book
- Author/Creator:
- D'Agostino, Giulio, author.
- Series:
- Computer Engineering Foundations, Currents, and Trajectories Collection
- Standardized Title:
- Data security in cloud computing
- Language:
- English
- Subjects (All):
- Cloud computing--Security measures.
- Cloud computing.
- Physical Description:
- 1 online resource (153 pages).
- Edition:
- 1st ed.
- Place of Publication:
- New York : Momentum Press Engineering, 2019.
- Summary:
- This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Cloud computing has already been adopted by many organizations and people because of its advantages of economy, reliability, scalability and guaranteed quality of service amongst others. Readers will learn specifics about software as a service (Saas), platform as a service (Paas), infrastructure as a service (IaaS), server and desktop virtualization, and much more. Readers will have a greater comprehension of cloud engineering and the actions required to rapidly reap its benefits while at the same time lowering IT implementation risk. The book's content is ideal for users wanting to migrate to the cloud, IT professionals seeking an overview on cloud fundamentals, and computer science students who will build cloud solutions for testing purposes.
- Contents:
- Cover
- DATA SECURITY IN CLOUD COMPUTING, VOLUME I
- Contents
- List of Figures
- List of Tables
- List of Abbreviations
- Acknowledgments
- Introduction
- Chapter 1: Cloud Computing Essentials
- 1.1. Infrastructure-as-a-Service
- 1.2. Platform-as-a-Service
- 1.3. Software-as-a-Service
- 1.4. Deployment Designs
- Chapter 2: Overview of Cloud Computing
- 2.1. Essential Characteristics
- 2.2. Cloud Services
- 2.3. Platform-as-a-Service and IaaS
- 2.4. Additional Cloud Services
- 2.5. XaaS (Anything-as-a-Service)
- 2.6. Public Cloud
- 2.7. Personal Cloud
- 2.8. Community Cloud
- 2.9. Hybrid
- 2.10. Cloud Provider Architectural Components
- 2.11. ITU-T Cloud Computing Reference Architecture
- 2.11.1. Cloud Computing "Actors"
- 2.11.2. Layered Architecture
- Chapter 3: Cloud Security Baselines
- 3.1. Fundamentals
- 3.2. Program Layer
- 3.3. Other Potential Reasons for Data Leakage from the Cloud
- 3.4. Privacy and Security in Multiclouds
- 3.5. Cloud Accountability
- Chapter 4: Cloud Computing Architecture
- 4.1. Hardware Customers
- 4.1.1. Thick Clients
- 4.1.2. Thin Clients
- 4.1.3. Smartphones
- 4.1.4. Software Customers
- 4.1.5. Thick or Thin . . . or Smart?
- 4.1.6. Thin or Web-applications Customers
- 4.1.7. Smart Customers
- 4.1.8. Personal Cloud
- 4.1.9. Virtual Private Cloud
- 4.2. Cloud-storage Prerequisites
- 4.3. Cloud OS Prerequisites
- 4.4. Memory Prerequisites
- 4.5. CPU Prerequisites
- 4.6. Software Prerequisites
- Chapter 5: Cloud Computing Security Essentials
- 5.1. Cloud Computing Definition
- 5.2. Cloud Computing Security Essentials
- 5.3. Dividing Operational Responsibilities
- 5.4. User-data Boundary
- 5.5. Ecosystem Orchestration Boundary
- 5.6. Deployment Boundary
- 5.7. Defining Your Root of Trust
- 5.8. Managing User Authentication and Authorization.
- Chapter 6: Cloud Security
- 6.1. The State of Cloud Security
- 6.2. Understanding the Threats
- 6.3. Classification and Countermeasures
- 6.3.1. Recruitment and Host Threats
- 6.3.2. Network Breaks
- 6.3.3. Lock-in
- 6.4. Compliance Issues
- 6.5. Infrastructure Modifications
- 6.6. Data Processing
- 6.7. Administrative and Assets
- 6.8. DoS
- 6.9. Service Provider
- 6.10. Information Interception
- 6.11. Clients' Negligence and Cloud Security
- 6.12. Reduction of Governance
- 6.13. Common Risks
- 6.14. Encryption Keys
- 6.15. Service Engine Presence
- About the author
- Index
- Ad page
- Back Cover.
- Notes:
- Includes index.
- Description based on print version record.
- ISBN:
- 9781949449006
- 1949449009
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.