Handbook of Research on Security Considerations in Cloud Computing

Editor/Author Munir, Kashif, Al-Mutairi, Mubarak S. and Mohammed, Lawan A.
Publication Year: 2015
Publisher: IGI Global

Single-User Purchase Price: $325.00
Unlimited-User Purchase Price: $487.50
ISBN: 978-1-4666-8387-7
Category: Technology & Engineering - Technology
Image Count: 80
Book Status: Available
Table of Contents

The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field.

Share this

Table of Contents

  • Editorial Advisory Board
  • Foreword
  • Preface
  • WHY CLOUD COMPUTING MATTERS?
  • OBJECTIVE
  • TARGET AUDIENCE
  • APPROACH
  • Acknowledgment
  • Chapter 1: Security Issues in Cloud Computing
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • SECURITY ISSUES IN CLOUD COMPUTING
  • SUMMARY OF THE CHAPTER
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 2: Cloud Computing Security
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 3: Cloud Security Using Ear Biometrics
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. LITERATURE REVIEW
  • 3. ISSUES AND CHALLENGES OF CLOUD COMPUTING SECURITY
  • 4. CLOUD SECURITY
  • 5. BIOMETRIC SYSTEM
  • 6. EAR BIOMETRIC SYSTEM
  • 7. CONCLUSION AND FUTURE DIRECTION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 4: Secure Architecture for Cloud Environment
  • ABSTRACT
  • INTRODUCTION
  • SECURITY CONCERNS OF CLOUD COMPUTING
  • VULNERABILITIES IDENTIFIED IN CLOUD COMPUTING
  • THREAT MODEL FOR CLOUD
  • VULNERABILITIES IN CLOUD ENVIRONMENT
  • THREATS TO CLOUD COMPUTING
  • ATTACKS ON CLOUD COMPUTING
  • SECURE CLOUD ARCHITECTURE
  • SECURE PROTOCOL – A PROPOSAL
  • SECURING CLOUD COMPUTING
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 5: Governance and Risk Management in the Cloud with Cloud Controls Matrix V3 and ISO/IEC 385002008
  • ABSTRACT
  • INTRODUCTION
  • MAIN FOCUS OF THE CHAPTER
  • ESSENTIAL CHARACTERISTICS OF CLOUD COMPUTING
  • CLOUD COMPUTING SERVICE MODELS
  • CLOUD COMPUTING DEPLOYMENT MODELS
  • CRITICAL AREAS OF FOCUS FOR A SECURED CLOUD ENVIRONMENT
  • VIRTUALIZATION ROUTE TO THE CLOUD
  • SECURITY RISKS IN VIRTUAL IT SYSTEMS
  • GOVERNANCE AND RISK MANAGEMENT IN THE CLOUD: ROLE OF THE BOARD
  • OVERVIEW OF GRM DOMAIN OF CSA CLOUD CONTROLS MATRIX V3 FRAMEWORK
  • OVERVIEW OF ISO/IEC 38500:2008 STANDARD FOR IT GOVERNANCE
  • “CLOUD GOVERNANCE MATRIX” FOR GOVERNANCE AND RISK MANAGEMENT
  • DERIVING BENEFITS FROM THE CLOUD GOVERNANCE MATRIX
  • CONCLUSION
  • DEDICATION
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 6: Authentication and Error Resilience in Images Transmitted through Open Environment
  • ABSTRACT
  • INTRODUCTION
  • LITERATURE REVIEW
  • PROPOSED APPROACH
  • EXPERIMENTAL SETUP AND RESULTS
  • COMPARATIVE DISCUSSION AND FUTURE DIRECTIONS
  • STANDARDIZATION REVIEW
  • CONCLUSION
  • ACKNOWLEDGMENT
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 7: Trust Calculation Using Fuzzy Logic in Cloud Computing
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • TRUST CALCULATION USING FUZZY LOGIC
  • TRUST CALCULATION USING FUZZY LOGIC IN CLOUD COMPUTING
  • COMPARISON OF DIFFERENT MODELS
  • SUMMARY, CONCLUSION, AND FUTURE SCOPE
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 8: Advances in Information, Security, Privacy & Ethics
  • ABSTRACT
  • INTRODUCTION
  • CLOUD COMPUTING
  • CYBER ATTACKS IN EDUCATION
  • CLOUD COMPUTING EDUCATIONAL MODEL
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 9: Networked Multimedia Communication Systems
  • ABSTRACT
  • INTRODUCTION
  • MULTIMEDIA COMMUNICATION
  • MULTIMEDIA COMMUNICATION OVER NETWORKS
  • MULTIMEDIA COMMUNICATION SYSTEM ARCHITECTURE
  • AUDIO-VIDEO CONFERENCING
  • MULTIMEDIA COMMUNICATION STANDARDS
  • DISTRIBUTED MULTIMEDIA SYSTEMS
  • SOME OF THE ADVANCE PROJECTS IN THE WORLD CREATING A REVOLUTION IN THE FIELD OF NETWORKED MULTIMEDIA SYSTEMS
  • SUMMARY
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • Chapter 10: Data Security Issues and Solutions in Cloud Computing
  • ABSTRACT
  • INTRODUCTION
  • DATA SECURITY ISSUES
  • DATA SECURITY SOLUTIONS
  • PROPOSED SCHEME
  • ANALYSIS AND COMPARISON
  • CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  • REFERENCES
  • ADDITIONAL READING
  • KEY TERMS AND DEFINITIONS
  • APPENDIX
  • Chapter 11: Improving Privacy and Security in Multicloud Architectures
  • ABSTRACT
  • CLOUD SERVICE MODELS
  • DATA INTEGRITY
  • DATA INTRUSION
  • ARCHITECTURES OF MULTICLOUD
  • REPETITION OF APPLICATION
  • PARTITION OF SYSTEM ARCHITECTURE INTO LAYERS
  • PARTITION OF SECURITY FEATURES INTO SEGMENTS
  • DISTRIBUTION OF DATA INTO FRAGMENTS
  • LEGAL ACCEPTANCES WITH MULTICLOUD ARCHITECTURES
  • ASSESSMENTS OF MULTICLOUD ARCHITECTURES
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 12: Hard Clues in Soft Environments
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND
  • ISSUES IN CLOUD COMPUTING
  • SOLUTIONS
  • OPEN ISSUES
  • FUTURE WORK
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 13: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. CLOUD COMPUTING MODELS
  • 3. BENEFITS OF CLOUD COMPUTING IN KSA
  • 4. SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT
  • 5. SECURITY REQUIREMENTS
  • 6. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 14: Big Data Security
  • ABSTRACT
  • INTRODUCTION
  • SECURITY CHALLENGES IN BIG DATA CONTEXT
  • BIG DATA SECURITY SOLUTIONS
  • EXAMPLE: SECURITY OF SMART GRID BIG DATA
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 15: Access Control Framework for Cloud Computing
  • ABSTRACT
  • INTRODUCTION
  • HISTORY OF ACCESS CONTROL MODELS
  • CODEWORDS
  • RELATED WORK
  • ROLE BASED ACCESS CONTROL (RBAC)
  • PROPOSED FRAMEWORK
  • SECURITY POLICIES
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 16: Big Data
  • ABSTRACT
  • INTRODUCTION
  • CHARACTERISTICS OF BIG DATA
  • RELATED WORK
  • DIMENSIONS OF GENERALIZED BIG DATA
  • BIG DATA MODEL
  • BIG DATA PROCESSING FRAMEWORK
  • DATA MINING CHALLENGES WITH BIG DATA
  • BIG DATA MINING PLATFORM
  • SECURITY AND UNCERTAINTY ISSUES IN BIG DATA
  • CONCLUSION
  • SUMMARY
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 17: Achieving Efficient Purging in Transparent per-file Secure Wiping Extensions
  • ABSTRACT
  • INTRODUCTION
  • BACKGROUND AND RELATED WORK
  • DESIGN OF RESTFS FILESYSTEM
  • IMPLEMENTATION OF RESTFS FILESYSTEM
  • EXPERIMENT
  • RESULTS AND DISCUSSION
  • CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Chapter 18: Reliability, Fault Tolerance, and Quality-of-Service in Cloud Computing
  • ABSTRACT
  • 1. INTRODUCTION
  • 2. CLOUD COMPUTING ARCHITECTURE
  • 3. TYPES OF CLOUDS
  • 4. RELIABILITY AND FAULT-TOLERANCE
  • 5. QUALITY OF SERVICE
  • 6. CONCLUSION
  • REFERENCES
  • KEY TERMS AND DEFINITIONS
  • Compilation of References
  • About the Contributors