Book description
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.
- Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field
- Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples
- Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics
- Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Contributors
- Foreword
- Preface
- About the Authors
- List of Reviewers
- Acknowledgments
-
Chapter 1: Cloud security ecosystem
- Abstract
- 1 How it all started—the story of an online bookstore
- 2 Consolidation of terminologies and perspectives
- 3 The achilles’ heel—depending on a trust relationship
- 4 Top threats and vulnerabilities of cloud security
- 5 Managing cloud security risks with the deming cycle
- 6 Plan—threats, risk, and requirements landscape
- 7 Do—cloud security approaches and challenges
- 8 Check—forensics and incident response
- 9 Act—governance and auditing
- 10 Summary
-
Part 1: Plan: Threats, Risk, and Requirements Landscape
- Chapter 2: Cybercrime in cloud: Risks and responses in Hong Kong, Singapore
- Chapter 3: CATRA: Conceptual cloud attack taxonomy and risk assessment framework
-
Chapter 4: Multitiered cloud security model
- Abstract
- Acknowledgments
- 1 Introduction
- 2 The problem
- 3 Holistic approach
- 4 Why develop cloud security standards and guidelines
- 5 Related work
- 6 Design considerations of multitiered cloud security
- 7 Benefits to stakeholders
- 8 MTCS standards
- 9 Self-disclosure
- 10 Certification scheme
- 11 Status
- 12 Deployment
- 13 Harmonization
- 14 Future work
- 15 Conclusion
-
Part 2: Do: Cloud Security Approaches and Challenges
-
Chapter 5: A guide to homomorphic encryption
- Abstract
- 1 Introduction
- 2 Current industry work-arounds and their gaps
- 3 History and related work
- 4 Overview of partial homomorphic encryption schemes
- 5 Fully homomorphic encryption
- 6 Homomorphic encryption in the cloud
- 7 Future of homomorphic encryption and open issues
- 8 Alternatives to homomorphic encryption
- 9 Summary
- Chapter 6: Protection through isolation: Virtues and pitfalls
- Chapter 7: Protecting digital identity in the cloud
- Chapter 8: Provenance for cloud data accountability
- Chapter 9: Security as a service (SecaaS)—An overview
- Chapter 10: Secure migration to the cloud—In and out
- Chapter 11: Keeping users empowered in a cloudy Internet of Things
- Chapter 12: Cloud as infrastructure for managing complex scalable business networks, privacy perspective
- Chapter 13: Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviors
-
Chapter 5: A guide to homomorphic encryption
-
Part 3: Check: Forensics and Incident Response
- Chapter 14: Conceptual evidence collection and analysis methodology for Android devices
- Chapter 15: Mobile cloud forensics: An analysis of seven popular Android apps
- Chapter 16: Recovering residual forensic data from smartphone interactions with cloud storage providers
- Chapter 17: Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model
- Chapter 18: Cloud security and forensic readiness: The current state of an IaaS provider
- Chapter 19: Ubuntu One investigation: Detecting evidences on client machines
- Part 4: Act: Governance and Auditing
- Index
Product information
- Title: The Cloud Security Ecosystem
- Author(s):
- Release date: June 2015
- Publisher(s): Syngress
- ISBN: 9780128017807
You might also like
book
Securing the Cloud
Securing the Cloud is the first book that helps you secure your information while taking part …
book
Assured Cloud Computing
Explores key challenges and solutions to assured cloud computing today and provides a provocative look at …
book
Cloud Computing Security
This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical …
book
Cloud Native Security
Explore the latest and most comprehensive guide to securing your Cloud Native technology stack Cloud Native …