TY - BOOK ID - 7537415 TI - Elements of Cloud Computing Security : A Survey of Key Practicalities PY - 2016 SN - 3319414100 3319414119 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Computer science. KW - Computer communication systems. KW - Computer security. KW - Data structures (Computer science). KW - Data encryption (Computer science). KW - Computer Science. KW - Computer Communication Networks. KW - Systems and Data Security. KW - Data Encryption. KW - Data Storage Representation. KW - Cloud computing KW - Security measures. KW - Electronic data processing KW - Web services KW - Distributed processing KW - Cryptology. KW - Informatics KW - Science KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Network computers UR - https://www.unicat.be/uniCat?func=search&query=sysid:7537415 AB - This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud. ER -