Secure Cloud Computing
暫譯: 安全雲端運算

  • 出版商: Springer
  • 出版日期: 2014-01-24
  • 售價: $4,510
  • 貴賓價: 9.5$4,285
  • 語言: 英文
  • 頁數: 343
  • 裝訂: Hardcover
  • ISBN: 1461492777
  • ISBN-13: 9781461492771
  • 相關分類: 雲端運算
  • 海外代購書籍(需單獨結帳)

商品描述

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

商品描述(中文翻譯)

本書介紹了一系列雲端計算安全挑戰及其有前景的解決方案。前兩章專注於雲端計算的實務考量。在第一章中,Chandramouli、Iorga 和 Chokani 描述了雲端計算的演變及當前的實務狀況,接著探討了雲端中的加密金鑰管理挑戰。在第二章中,Chen 和 Sion 提出了雲端計算的美元成本模型,並探討了有無安全機制(包括加密機制)下雲端計算的經濟可行性。接下來的兩章針對雲端基礎設施的安全問題。在第三章中,Szefer 和 Lee 描述了一種硬體增強的安全架構,該架構保護虛擬機記憶體的機密性和完整性,免受不受信任或惡意的虛擬機監控程式的侵害。在第四章中,Tsugawa 等人討論了在雲端內部及跨雲端部署軟體定義網路(SDN)所引入的安全問題。第五至第九章專注於保護存儲在雲端中的數據。在第五章中,Wang 等人提出了兩種存儲隔離方案,使具有高安全需求的雲端用戶能夠驗證其磁碟存儲是否與其他用戶隔離,而無需雲端服務提供商的合作。在第六章中,De Capitani di Vimercati、Foresti 和 Samarati 描述了保護外部存儲數據的新興方法,並強制對其進行細粒度和選擇性訪問,並說明這些方法的組合如何引入新的隱私風險。在第七章中,Le、Kant 和 Jajodia 探討了在多方制定各自授權規則的協作企業計算環境中,數據訪問的挑戰,並討論了規則一致性、執行和動態更新的問題。在第八章中,Smith 等人針對支持在不暴露解密金鑰或明文的情況下,對遠程加密數據執行查詢的系統實現的關鍵挑戰進行了探討。在第九章中,Sun 等人提供了加密數據上安全搜索技術的概述,並詳細說明了一種能夠實現隱私保護的多關鍵字文本搜索方案。接下來的三章專注於計算的安全部署到雲端。在第十章中,Oktay 等人提出了一種基於風險的混合雲工作負載分配方法,根據數據和計算的敏感性水平選擇性地外包數據和計算。該章還描述了一個雲端計算環境的脆弱性評估框架。在第十一章中,Albanese 等人提出了一種在雲端部署任務的解決方案,同時最小化任務暴露於已知脆弱性的風險,並提供了一種經濟有效的方法來加固選定的計算資源以支持該任務。在第十二章中,Kontaxis 等人描述了一種生成計算誘餌的系統,以引入不確定性並欺騙對手,使其無法判斷哪些數據和計算是合法的。本書的最後一部分針對安全監控和系統韌性相關的問題。在第十三章中,Zhou 提出了一種安全的基於來源的能力,該能力捕捉系統狀態之間的依賴關係,隨時間跟蹤狀態變化,並回答有關系統狀態在特定時間的存在或變化的歸因問題。在第十四章中,Wu 等人提出了一種針對多核心架構的監控能力,該能力與用戶或內核代碼並行運行監控線程,以不斷檢查安全違規行為。最後,在第十五章中,Hasan Cam 描述了如何通過對線性和非線性系統應用可控性和可觀測性技術來管理網絡物理系統的風險和韌性。