This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.
Index Terms
- Elements of Cloud Computing Security: A Survey of Key Practicalities
Recommendations
Cloud Computing Security: Amazon Web Service
ACCT '15: Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication TechnologiesCloud Computing is a recently emerged model which is becoming popular among almost all enterprises. It involves the concept of on demand services which means using the cloud resources on demand and we can scale the resources as per demand. Cloud ...
Cloud computing security: challenges and future trends
Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy clients' requirements for computing resources such as services, applications, networks, storage and servers. They offer the possibility of leasing these resources ...
Cloud Computing Security: From Single to Multi-clouds
HICSS '12: Proceedings of the 2012 45th Hawaii International Conference on System SciencesThe use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, ...