Data security in cloud computing Volume I Volume I /

This book covers not only information protection in cloud computing, architecture and fundamentals, but also the plan design and in-depth implementation details needed to migrate existing applications to the cloud. Readers will have a greater comprehension of cloud engineering and the actions requir...

Descripción completa

Detalles Bibliográficos
Autor principal: D'Agostino, Giulio (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: New York : Momentum Press 2019.
Edición:1st ed
Colección:EBSCO Academic eBook Collection Complete.
Computer engineering foundations currents and trajectories collection.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b40770497*spi
Tabla de Contenidos:
  • Chapter 1. Cloud computing essentials. 1.1. Infrastructure-as-a-service ; 1..2. Platform-as-a-service ; 1.3. Software-as-a-service ; 1.4. Deployment designs
  • Chapter 2. Overview of cloud computing. 2.1. Essential characteristics ; 2.2. Cloud services ; 2.3. Platform-as-a-service and IIaaS ; 2.4. Additional cloud services ; 2.5. XaaS (anything-as-a-service) ; 2.6. Public cloud ; 2.7. Personal cloud ; 2.8. Community cloud ; 2.9. Hybrid ; 2.10. Cloud provider architectural components ; 2.11. ITU-T cloud computing reference architecture ; 2.11.1. Cloud computing *Actors* ; 2.11.2. Layered architecture ; 2.12. Network requirements for cloud computing
  • Chapter 3. Cloud security baselines. 3.1. Fundamentals ; 3.2. Program layer ; 3.3. Other potential reasons for data leakage from the cloud ; 3.4. Privacy and security in multiclouds ; 3.5. Cloud accountability
  • CChapter 4. Cloud computing architecture. 4.1. Hardware customers ; 4.1.1. Thick clients ;4.1.2. Thin clients ; 4.1.3. Smartphones ; 4.1.4. Software customers ; 4.1.5. Thick or thin ... or smart? ; 4.1.6. Thin or web-applications customers ; 4.1.7. Smart customers ; 4.1.8. Personal cloud ; 4.1.9. Virtual private cloud ; 4.2. Cloud-storage prerequisites ; 4.3. Cloud OS prerequisites ; 4.4. Memory prerequisites ; 4.5. CPU prerequisites ; 4.6. Software prerequisites
  • Chapter 5. Cloud computing security essentials. 5.1. Cloud computing definition ; 5.2. Cloud computing security essentials ; 5.3. Dividing operational responsibilities ; 5.4. User-data boundary ; 5.5. Ecosystem orchestration boundary ; 5.6. Deployment boundary ; 5.7. Defining your root of trust ; 5.8. Managing user authentication and authorization
  • Chapter 6. Cloud security. 6.1. The state of cloud security ; 6.2. Understanding the threats ; 6.3. Classification and countermeasures ; 6.3.1. Recruitment and host threats 6.3.2. Network breaks ; 6.3.3. Lock-in ; 6.4. Compliance issues ; 6.5. Infrastructure modifications ; 6.6. Data processing ; 6.7. Administrative and assets ; 6.8. DoS ; 6.9. Service provider ; 6.10. Information interception ; 6.11. Clients' negligence and cloud security ; 6.12. Reduction of governance ; 6.13. Common risks ; 6.14. Encryption keys ; 6.15. Service engine presence.