Security for cloud computing
Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and t...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Boston, London
Artech House
2015
|
Schriftenreihe: | Artech house computer security series
|
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Machine generated contents note: 1.Introduction -- 1.1.Motivation -- 1.2.About this Book -- 1.3.Roadmap -- 2.Cloud Definition and Technologies -- 2.1.Defining the Cloud -- 2.2.Cloud Approaches and Technologies -- 2.2.1.Amazon Web Services -- 2.2.2.MS Azure -- 2.2.3.OpenStack -- 2.3.Outsourcing and the Cloud -- 2.4.Accreditation and Certification Issues -- 2.5.Conclusions -- 3.Cloud Security and Virtualization -- 3.1.Introduction -- 3.2.Cloud Security Issues -- 3.2.1.A Model for Cloud Security -- 3.3.General Cloud Protection -- 3.3.1.Threat Model -- 3.3.2.Requirements -- 3.3.3.Effective Monitoring -- 3.4.Technological Details -- 3.5.Attacks and Responses -- 3.5.1.Dealing with Attacks -- 3.6.Nested Virtualization and Finer-Grained Security -- 3.7.Relevant Contributions to Virtualization Security -- 3.8.Conclusion -- 4.Privacy Issues in the Cloud -- 4.1.Introduction -- 4.2.Cloud Privacy Issues -- 4.3.Encryption-Based Solutions For Confidentiality -- 4.4.Statistical Disclosure -- 4.5.Data Splitting -- 4.6.Other Security Aspects -- 4.7.Relevant Security Metrics -- 4.8.Other Relevant Approaches and Open Issues -- 4.9.Conclusion -- 5.Advanced Monitoring of Services -- 5.1.Introduction -- 5.1.1.Content and Organization -- 5.2.Modeling And Monitoring Approaches -- 5.2.1.VM Monitoring and Security -- 5.2.2.Modeling Complex Systems -- 5.3.Graph-Based Modeling and EPA -- 5.3.1.Advanced Scenario Graphs -- 5.3.2.Action Graph -- 5.3.3.Cooperating Graphs -- 5.3.4.Node (Re-)Labeling -- 5.4.Technological Details Discussion -- 5.5.Conclusion -- 6.Cloud Approaches to Resilience -- 6.1.Introduction -- 6.2.Problem Statement and Model -- 6.2.1.Modeling -- 6.3.Simpler Approaches -- 6.4.More Complex Approaches -- 6.4.1.Multiround Adaptive Assignment Matrix -- 6.4.2.A Possible Threat Model -- 6.4.3.Adaptive Approaches to Cheating Detection -- 6.5.Alternative Approaches to Reliability -- 6.6.Conclusion -- 7.Secure GPU Cloud -- 7.1.Introduction -- 7.2.GPUS and Computing -- 7.3.GPU Architectures -- 7.3.1.Global Memory -- 7.3.2.Shared Memory -- 7.3.3.Registers -- 7.4.GPU Cloud and Virtualization Approaches -- 7.4.1.Virtualized CUDA -- 7.4.2.GPU Cloud and Gaming -- 7.5.GPU Data Leakages -- 7.5.1.Exploiting Shared Memory -- 7.5.2.Exploiting Global Memory -- 7.6.Effective Solutions and Workarounds -- 7.7.Competing Technologies and Security -- 7.8.Conclusion -- 8.Security and Reliability of Cloud Networks -- 8.1.Introduction -- 8.2.Defining SDN and NFV -- 8.3.Virtual Networking Implementations -- 8.3.1.OpenDaylight -- 8.3.2.Open vSwitch -- 8.3.3.Ryu -- 8.4.Security Issues -- 8.5.Conclusion -- 9.Concluding Remarks -- 9.1.Summary of the Contributions -- 9.2.Boundary of the Presented Approaches and Outlook -- 9.3.A Perspective on Interesting Future Developments -- 10.References |
---|---|
Beschreibung: | Literaturverzeichnis: Seite 151-176 |
Beschreibung: | 193 Seiten Diagramme |
ISBN: | 1608079899 1-60807-989-9 9781608079896 978-1-60807-989-6 |