000 03309nam a22005295i 4500
001 978-3-319-44962-3
003 DE-He213
005 20200421112227.0
007 cr nn 008mamaa
008 161003s2016 gw | s |||| 0|eng d
020 _a9783319449623
_9978-3-319-44962-3
024 7 _a10.1007/978-3-319-44962-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aGalibus, Tatiana.
_eauthor.
245 1 0 _aElements of Cloud Storage Security
_h[electronic resource] :
_bConcepts, Designs and Optimized Practices /
_cby Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque, Edison Pignaton de Freitas.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXII, 101 p. 29 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5768
505 0 _aThe Cloud Environment Security Landscape -- Common Attacks and Vulnerabilities in Cloud Storage -- Cloud Storage Security Mechanisms -- Cloud Storage Security Architecture -- Afterword.
520 _aThis work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. Experience of scientific collaboration with industry inspired the authors to attempt to conceptualize the common processes and strategies in cloud security, in order to make security system deployment as simple and transparent as possible. The deployment is broken into several essential steps that allow the functionality of security architecture for any cloud to be split into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes and communication channels) helps to avoid common security breaches and protect against the most dangerous attacks. Additionally, performing the proposed optimization of the selected set of mechanisms will enhance the efficiency of the security system.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aComputer security.
650 0 _aData encryption (Computer science).
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aData Encryption.
650 2 4 _aSystems and Data Security.
700 1 _aKrasnoproshin, Viktor V.
_eauthor.
700 1 _ade Oliveira Albuquerque, Robson.
_eauthor.
700 1 _aPignaton de Freitas, Edison.
_eauthor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319449616
830 0 _aSpringerBriefs in Computer Science,
_x2191-5768
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-44962-3
912 _aZDB-2-SCS
942 _cEBK
999 _c57716
_d57716