Narrow your search
Listing 1 - 6 of 6
Sort by

Book
CCSW '21 : proceedings of the 2021 Cloud Computing Security Workshop : November 15, 2021, virtual event, Republic of Korea
Authors: ---
Year: 2021 Publisher: New York : The Association for Computing Machinery,

Loading...
Export citation

Choose an application

Bookmark

Abstract

It is our great pleasure to welcome you to the 12th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacks, Practical cryptographic protocols for cloud security, Secure cloud resource virtualization mechanisms, Secure data management outsourcing (e.g., database as a service), Practical privacy and integrity mechanisms for outsourcing, Foundations of cloud-centric threat models, Secure computation outsourcing, Remote attestation mechanisms in clouds, Sandboxing and VM-based enforcements, Trust and policy management in clouds, Secure identity management mechanisms, New cloud-aware web service security paradigms and mechanisms, Cloud-centric regulatory compliance issues and mechanisms, Business and security risk models and clouds, Cost and usability models and their interaction with security in clouds, Scalability of security in global-size clouds, Trusted computing technology and clouds, Binary analysis of software for remote attestation and cloud protection, Network security (DOS, IDS etc.) mechanisms for cloud contexts, Security for emerging cloud programming models, Energy/cost/efficiency of security in clouds, Machine learning for cloud protection.


Book
Cloud storage security
Authors: ---
ISBN: 0128029315 0128029307 9780128029312 9780128029305 9780128029305 Year: 2015 Publisher: Amsterdam, Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.Describes the history and the evolving nature of cloud storage and securityExplores the threat


Book
The cloud
Authors: --- ---
ISBN: 0833059580 1280126949 9786613530806 0833059602 9780833059604 9780833059581 9780833059604 9781280126949 6613530808 Year: 2011 Publisher: Santa Monica Rand

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.


Book
Security for cloud storage systems
Authors: ---
ISSN: 21915768 ISBN: 1461478723 1461478731 Year: 2014 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.


Book
Privacy and security for cloud computing
Authors: ---
ISBN: 1447141881 1447157931 9786613934505 144714189X 128362205X Year: 2013 Publisher: New York : Springer-Verlag,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Despite the enormous potential of cloud computing, consumer uncertainty and concern regarding issues of privacy, security and trust remain a major barrier to the switch to cloud models. This comprehensive and authoritative text/reference provides an in-depth analysis of the latest advances in privacy, security and risk technologies within cloud environments. Containing contributions from leading experts in the field, the text presents both a thorough introduction to the core issues, and a practical selection of innovative solutions to common problems. A Glossary is also included at the end of the book. Topics and features: Considers the various forensic challenges for legal access to data in a cloud computing environment Discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems Reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud Proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties Investigates the applicability of existing controls for mitigating information security risks to cloud computing environments Describes risk management for cloud computing from an enterprise perspective This pioneering volume is essential reading for business professionals, students and researchers interested in the field of privacy and security protection for the cloud, and/or complex service provisioning. Newcomers to these areas will benefit from the solid overview of the field, whereas established experts will value the novel, cutting-edge research described in the work.

Keywords

Cloud computing -- Security measures. --- Computer networks -- Security measures. --- Data protection. --- Internet -- Security measures. --- Cloud computing --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information technology --- Security measures. --- Computer science. --- Computer software --- Computer system failures. --- Architecture, Computer. --- Management information systems. --- Computer Science. --- Computer System Implementation. --- System Performance and Evaluation. --- Performance and Reliability. --- Management of Computing and Information Systems. --- Reusability. --- Electronic data processing --- Web services --- Distributed processing --- Computer network architectures. --- Computer system performance. --- Operating systems (Computers). --- Information Systems. --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Operating systems --- Computer software—Reusability. --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Architecture, Computer --- Communication systems --- Failures


Book
Secure Cloud Computing
Authors: --- --- --- --- --- et al.
ISBN: 1461492777 1461492785 Year: 2014 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Keywords

Cloud computing -- Security measures. --- Cloud computing. --- Computer Communication Networks. --- Computer science. --- Computer security. --- Data processing. --- Data protection. --- Information systems. --- Cloud computing --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information technology --- Data protection --- Security measures. --- Management. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer communication systems. --- Computers. --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Information Systems and Communication Service. --- Electronic data processing --- Web services --- Distributed processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Protection --- Application software. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software

Listing 1 - 6 of 6
Sort by