ABSTRACT

This handbook offers a comprehensive overview of cloud computing security technology and implementation, while exploring practical solutions to a wide range of cloud computing security issues. With more organizations using cloud computing and cloud providers for data operations, proper security in these and other potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research efforts from both academia and industry in all security aspects related to cloud computing are gathered within one reference guide.

part |2 pages

SECTION II: Risk Analysis and Division of Responsibility

part |2 pages

SECTION III: Securing the Cloud Infrastructure

chapter 16|10 pages

◾ Secure Cloud Architecture

part |2 pages

SECTION IV: Operating System and Network Security

part |2 pages

SECTION V: Meeting Compliance Requirements

chapter 22|16 pages

◾ Secure Computation Outsourcing

chapter 23|16 pages

◾ Computation Over Encrypted Data

chapter 24|10 pages

◾ Trusted Computing Technology

part |2 pages

SECTION VI: Preparing for Disaster Recovery