Please use this identifier to cite or link to this item:
|Title:||Elements of Cloud Storage Security: Concepts, Designs and Optimized Practices|
|Authors:||Krasnoproshin, V. V.|
Robson de Oliveira Albuquerque
Edison Pignaton de Freitas
|Keywords:||ЭБ БГУ::ОБЩЕСТВЕННЫЕ НАУКИ::Информатика|
ЭБ БГУ::ЕСТЕСТВЕННЫЕ И ТОЧНЫЕ НАУКИ::Математика
|Abstract:||This book is a result of scientific and industrial collaboration in the field of cloud protection. It provides guidelines for the practical implementation of security archi-tecture in a particular corporate cloud. The authors are mathematicians and special-ists in data modeling and security. The scientific collaboration with the industry inspired the authors to attempt to conceptualize the common processes and strate-gies in cloud security in order to make the security system deployment as simple and transparent as possible. The deployment is broken in several essential steps that allow splitting the functionality of the security architecture of any cloud into a set of modules. The first step is the level of architecture where the authentication and key establishment procedures are identified. The second step provides the support of the authorization and other additional security mechanisms for each component of the cloud. The continuous verification of security support on all levels (data, processes, and communication channels) allows avoiding the common security breaches and protecting against the most dangerous attacks at maximum. Additionally, it is proposed to perform the optimization of the selected set of mechanisms in order to intensify the efficiency of the security system.|
|Description:||© The Author(s) 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, microfilms broadcasting, reproduction on or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither Ihe publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper. This Springer imprint is published by Springer Nature. The registered company is Springer International Publishing AG. The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland|
|Appears in Collections:||Монографии факультета прикладной математики и информатики|
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.