Coverart for item
The Resource Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices

Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices

Label
Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices
Title
Elements of Cloud Storage Security
Title remainder
Concepts, Designs and Optimized Practices
Creator
Contributor
Subject
Language
eng
Member of
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Series statement
SpringerBriefs in Computer Science
Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices
Label
Elements of Cloud Storage Security : Concepts, Designs and Optimized Practices
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4709265
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Related Items
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Abstract -- Preface -- References -- Contents -- Chapter 1: Cloud Environment Security Landscape -- 1.1 Cloud Computing Model Background -- 1.2 Cloud Service Models -- 1.3 Deployment Models -- 1.4 Cloud Storage Classification -- 1.4.1 Corporate Cloud Storage Types -- 1.4.2 Corporate Cloud Storage Components -- 1.4.3 Centralization Features -- 1.4.4 Basic Scenarios -- 1.5 Cloud Security Requirements -- 1.5.1 Top Cloud Security Threats -- 1.5.2 Cloud Security Requirements Recommendation -- References -- Chapter 2: Common Cloud Attacks and Vulnerabilities -- 2.1 Types of Attacks in Cloud Systems -- 2.2 Classification of Attacks According to General Security Mechanisms -- 2.3 Classification of Vulnerabilities According to General Security Mechanisms -- 2.4 Threats Applied to Cloud Solutions -- 2.5 Classification of Threats According to General Security Mechanisms -- 2.6 Adversary Types Related to Cloud Solution Providers -- References -- Chapter 3: Cloud Storage Security Mechanisms -- 3.1 Authentication and Tokenization -- 3.1.1 Definition and Specific Characteristics -- 3.1.2 Types of Authentication -- 3.1.3 Usage of Tokens in the Cloud Storage -- 3.2 Key Distribution and Data Encryption -- 3.2.1 Encryption in the Cloud -- 3.2.2 Additional Methods -- 3.2.3 Key Distribution -- 3.2.4 Key Storing and Using -- 3.3 Authorization and Access Control Support -- 3.3.1 Definition and Implementation of Access Control -- 3.3.2 Access Control Models and Policies -- 3.3.3 Access Control Methods -- 3.3.4 Key Renewal and Revocation -- 3.3.5 Authorization Vulnerabilities, Attacks, and Requirements -- 3.4 Threat Intelligence -- 3.5 Cloud Storage Component Security -- 3.5.1 Server-Side Protection -- 3.5.2 Client-Side Protection -- 3.5.3 Mobile Device Protection -- 3.5.4 Channel Protection Mechanisms -- References -- Chapter 4: Cloud Storage Security Architecture
  • 4.1 General Model of the Security System -- 4.2 Step-by-Step Security System Construction -- 4.3 Identification of the Identity Management Infrastructure -- 4.3.1 Formal Model of Identity Management Infrastructure -- 4.3.2 Types of IMI in Relation to Cloud Storages -- 4.3.3 Proposed Authentication Solutions -- 4.4 Identification of Access Control Framework -- 4.4.1 Setting Up Security Policies -- 4.4.2 Configuring the Data Encryption -- 4.4.3 Configuring Key Management -- 4.5 Identification of Threat Intelligence Unit -- 4.6 Identification of the Component Security Framework -- 4.6.1 The Basic Strategies to Organize the Server Protected Storage -- 4.6.2 The Basic Strategies to Secure the Client Application -- 4.7 Security Optimization and Verification -- 4.7.1 Attack Prevention Verification -- 4.7.2 Component Security Testing -- 4.7.3 Security Optimization -- 4.8 The Practical Implementation -- References -- Afterword -- Reference
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9783319449623&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4386224'}
Extent
1 online resource (112 pages)
Form of item
online
Isbn
9783319449623
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...