Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Building the Infrastructure for Cloud Security - A Solutions View

Building the Infrastructure for Cloud Security

A Solutions View

Yeluri, Raghuram, Castro-Leon, Enrique

2014, XXVI, 244 p. 95 illus.

A product of Apress
Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

(net) price for USA

ISBN 978-1-4302-6145-2

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

$39.99

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides:

  • Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT).
  • Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud.
  • OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud.
  • A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

"A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc.

" Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc.

"Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation

Content Level » Popular/general

Related subjects » Security and Cryptology

Table of contents 

Chapter 1: Cloud Computing Basics

Chapter 2: The Trusted Cloud: Addressing Security and Compliance

Chapter 3: Platform Boot Integrity: Foundation for Trusted Compute Pools

Chapter 4: Attestation: Proving Trustability

Chapter 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging

Chapter 6: Network Security in the Cloud

Chapter 7: Identity Management and Control for Clouds

Chapter 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud

Chapter 9: A Reference Design for Secure Cloud Bursting

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Systems and Data Security.