Atjaunināt sīkdatņu piekrišanu

E-grāmata: Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices

  • Formāts: PDF+DRM
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 03-Oct-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319449623
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 03-Oct-2016
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319449623
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.

The Cloud Environment Security LandscapeCommon Attacks and Vulnerabilities in Cloud StorageCloud Storage Security MechanismsCloud Storage Security ArchitectureAfterword
1 Cloud Environment Security Landscape
1(18)
1.1 Cloud Computing Model Background
1(2)
1.2 Cloud Service Models
3(3)
1.3 Deployment Models
6(2)
1.4 Cloud Storage Classification
8(4)
1.4.1 Corporate Cloud Storage Types
9(1)
1.4.2 Corporate Cloud Storage Components
10(1)
1.4.3 Centralization Features
11(1)
1.4.4 Basic Scenarios
11(1)
1.5 Cloud Security Requirements
12(7)
1.5.1 Top Cloud Security Threats
14(3)
1.5.2 Cloud Security Requirements Recommendation
17(1)
References
18(1)
2 Common Cloud Attacks and Vulnerabilities
19(18)
2.1 Types of Attacks in Cloud Systems
19(6)
2.2 Classification of Attacks According to General Security Mechanisms
25(2)
2.3 Classification of Vulnerabilities According to General Security Mechanisms
27(1)
2.4 Threats Applied to Cloud Solutions
27(4)
2.5 Classification of Threats According to General Security Mechanisms
31(1)
2.6 Adversary Types Related to Cloud Solution Providers
31(6)
References
34(3)
3 Cloud Storage Security Mechanisms
37(32)
3.1 Authentication and Tokenization
37(4)
3.1.1 Definition and Specific Characteristics
37(1)
3.1.2 Types of Authentication
38(2)
3.1.3 Usage of Tokens in the Cloud Storage
40(1)
3.2 Key Distribution and Data Encryption
41(8)
3.2.1 Encryption in the Cloud
42(2)
3.2.2 Additional Methods
44(1)
3.2.3 Key Distribution
45(1)
3.2.4 Key Storing and Using
45(4)
3.3 Authorization and Access Control Support
49(5)
3.3.1 Definition and Implementation of Access Control
49(1)
3.3.2 Access Control Models and Policies
50(1)
3.3.3 Access Control Methods
51(2)
3.3.4 Key Renewal and Revocation
53(1)
3.3.5 Authorization Vulnerabilities, Attacks, and Requirements
53(1)
3.4 Threat Intelligence
54(4)
3.5 Cloud Storage Component Security
58(11)
3.5.1 Server-Side Protection
59(2)
3.5.2 Client-Side Protection
61(1)
3.5.3 Mobile Device Protection
62(3)
3.5.4 Channel Protection Mechanisms
65(1)
References
66(3)
4 Cloud Storage Security Architecture
69(32)
4.1 General Model of the Security System
69(2)
4.2 Step-by-Step Security System Construction
71(3)
4.3 Identification of the Identity Management Infrastructure
74(4)
4.3.1 Formal Model of Identity Management Infrastructure
74(1)
4.3.2 Types of IMI in Relation to Cloud Storages
75(2)
4.3.3 Proposed Authentication Solutions
77(1)
4.4 Identification of Access Control Framework
78(8)
4.4.1 Setting Up Security Policies
78(3)
4.4.2 Configuring the Data Encryption
81(2)
4.4.3 Configuring Key Management
83(3)
4.5 Identification of Threat Intelligence Unit
86(1)
4.6 Identification of the Component Security Framework
86(5)
4.6.1 The Basic Strategies to Organize the Server Protected Storage
87(3)
4.6.2 The Basic Strategies to Secure the Client Application
90(1)
4.7 Security Optimization and Verification
91(3)
4.7.1 Attack Prevention Verification
91(1)
4.7.2 Component Security Testing
91(1)
4.7.3 Security Optimization
91(3)
4.8 The Practical Implementation
94(7)
References
100(1)
Afterword 101(1)
Reference 101