Cover image for Security for Cloud Computing.
Security for Cloud Computing.
Title:
Security for Cloud Computing.
Author:
Lombardi, Flavio.
ISBN:
9781608079902
Personal Author:
Physical Description:
1 online resource (195 pages)
Contents:
Security for Cloud Computing -- Preface -- 1 Introduction -- 1.1 Motivation -- 1.2 The Present Book -- 1.3 Roadmap -- 2 Cloud Definition and Technologies -- 2.1 Defining The Cloud -- 2.2 Cloud Approaches And Technologies -- 2.2.1 Amazon Web Services -- 2.2.2 MS Azure -- 2.2.3 OpenStack -- 2.3 Outsourcing And The Cloud -- 2.4 Accreditation And Certification Issues -- 2.5 Conclusions -- 3 Cloud Security and Virtualization -- 3.1 Introduction -- 3.2 Cloud Security Issues -- 3.2.1 A Model for Cloud Security -- 3.3 General Cloud Protection -- 3.3.1 Threat Model -- 3.3.2 Requirements -- 3.3.3 Effective Monitoring -- 3.4 Technological Details -- 3.5 Attacks and Responses -- 3.5.1 Dealing with Attacks -- 3.6 Nested Virtualization and Finer-Grained Security -- 3.7 Relevant Contributions to Virtualization Security -- 3.8 Conclusion -- 4 Privacy Issues in the Cloud -- 4.1 Introduction -- 4.2 Cloud Privacy Issues -- 4.3 Encryption-Based Solutions For Confidentiality -- 4.4 Statistical Disclosure -- 4.5 Data Splitting -- 4.6 Other Security Aspects -- 4.7 Relevant Security Metrics -- 4.8 Other Relevant Approaches and Open Issues -- 4.9 Conclusion -- 5 Advanced Monitoring of Services -- 5.1 Introduction -- 5.1.1 Content and Organization -- 5.2 Modeling And Monitoring Approaches -- 5.2.1 VM Monitoring and Security -- 5.2.2 Modeling Complex Systems -- 5.3 Graph-Based Modeling and EPA -- 5.3.1 Advanced Scenario Graphs -- 5.3.2 Action Graph -- 5.3.3 Cooperating Graphs -- 5.3.4 Node (Re-)Labeling -- 5.4 Technological Details Discussion -- 5.5 Conclusion -- 6 Cloud Approaches to Resilience -- 6.1 Introduction -- 6.2 Problem Statement and Model -- 6.2.1 Modeling -- 6.3 Simpler Approaches -- 6.4 More Complex Approaches -- 6.4.1 Multiround Adaptive Assignment Matrix. -- 6.4.2 A Possible Threat Model -- 6.4.3 Adaptive Approaches to Cheating Detection.

6.5 Alternative Approaches To Reliability -- 6.6 Conclusion -- 7 Secure GPU Cloud -- 7.1 Introduction -- 7.2 GPUS and Computing -- 7.3 GPU Architectures -- 7.3.1 Global Memory -- 7.3.2 Shared Memory -- 7.3.3 Registers -- 7.4 GPU Cloud and Virtualization Approaches -- 7.4.1 Virtualized CUDA -- 7.4.2 GPU Cloud and Gaming -- 7.5 GPU Data Leakages -- 7.5.1 Exploiting Shared Memory -- 7.5.2 Exploiting Global Memory -- 7.6 Effective Solutions and Workarounds -- 7.7 Competing Technologies and Security -- 7.8 Conclusion -- 8 Security and Reliability of Cloud Networks -- 8.1 Introduction -- 8.2 Defining SDN and NFV -- 8.3 Virtual Networking Implementations -- 8.3.1 OpenDaylight -- 8.3.2 Open vSwitch -- 8.3.3 Ryu -- 8.4 Security Issues -- 8.5 Conclusion -- 9 Concluding Remarks -- 9.1 Summary of the Contributions -- 9.2 Boundary of the Presented Approaches and Outlook -- 9.3 A Perspective on Interesting Future Developments -- 10 References -- Glossary -- About the Authors -- Index.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: