List of Contributorsxv
Part ⅠCloud Securityand Privacy
Introduction to the Cloud and Fundamental Security and Privacylssues of the Cloud
Hassan Takabi and Mohammod GhasemiGol
1.1 Introduction
1.2 Cloud Computing and Securitylssues
1.3 Identity Securityin the Cloud
1.4 Information Securityin the Cloud
1.4.1 Confidentiality
1.4.2 Integrity
1.4.3 Availability
1.4.4 Accountability
1.4.5 Nonrepudiation
1.4.6 Key Considerations in Information Security
1.4.7 Information Security Analysis in Some Clouds
1.5 Cloud Security Standards
1.6 Conclusion
References
2 Cloudlnfrastructure Security
Mohammad Ghasemi Go
2.1 Introduction
2.2 Infrastructure Securityin the Cloud
2.2.1 Infrastructure Security: The Network Level
2.2.1.1 Network-LeveI Mitigation
2.2.2 Infrastructure Security: The Host Level
2.2.2.1 SaaS and PaaS Host Security
2.2.2.2 IaaS Host Security
2.2.3 Infrastructure Security: The Application Level
2.2.4 Hypervisor Securityin the Cloud
2.3 Infrastructure Security Analysis in Some Clouds
2.3.1 Force URL
2.3.2 Amazon AWS
2.3.3 Google App Engine
2.3.4 Microsoft Azure
2.4 Protecting Cloud Infrastructure
2.4.1 Software Maintenance and Patching Vulnerabilities
2.4.2 The Technology Stack
2.4.3 Disaster Recovery
2.4.4 Monitoring and Defending Infrastructure
2.4.5 Incident Response Team
2.4.6 Malicious Insiders
2.5 Conclusion
References
3 Confidentiality of Data in the Cloud: Conflicts Between Security and Cost
Nathalie Boracaldo and Joseph Glider
3.1 Introduction.
3.2 Background
3.3 Confidentiality: Threats and Adversaries
3.4 Achieving Data Confidentiality in Cloud Storage Systems
3.4.1 Cryptographic Solutions
3.4.1.1 Stage Encryption
3.4.1.2 End-to-End Encryption
3.5 Reducing Cloud Storage System Costs through Data-Reduction
Techniques
3.6 Reconciling Data Reduction and Confidentiality
3.6.1 Existing Techniques
3.7 Trusted Decrypter
3.7.1 Overview
3.7.2 Secure Data-Reduction Operations
3.7.2.1 Preliminaries
3.7.2.2 Detailed Secure Data-Reduction Operations
3.7.2.3 Write Requests
3.7.2.4 Read Requests
3.7.2.5 Rekeying Requests
3.7.2.6 File Deletion
3.7.2.7 Offboarding Requests
3.7.2.8 Secure Data Deletion
3.7.3 Securing the CriticaI Module
3.7.4 Security Analysis
3.7.4.1 Data Confidentiality
3.7.4.2 Data Confidentiality in the Presence of Deduplication
3.7.4.3 Security Impact of Different Technologies
3.7.5 TD Overhead and Performance Implications
3.8 Future Directions for Cloud Storage Confidentiality with Low Cost
……
Part Ⅱ Cloud Forensics