Building the Infrastructure for Cloud Security

A Solutions view

by Raghu Yeluri, Enrique Castro-Leon

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical.

applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges.

This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT); Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud; OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud; A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations.

This open book is licensed under a Creative Commons License (CC BY-NC-ND). You can download Building the Infrastructure for Cloud Security ebook for free in PDF format (8.6 MB).

Table of Contents

Chapter 1
Cloud Computing Basics
1
Chapter 2
The Trusted Cloud: Addressing Security and Compliance
19
Chapter 3
Platform Boot Integrity: Foundation for Trusted Compute Pools
37
Chapter 4
Attestation: Proving Trustability
65
Chapter 5
Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
93
Chapter 6
Network Security in the Cloud
123
Chapter 7
Identity Management and Control for Clouds
141
Chapter 8
Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
161
Chapter 9
A Reference Design for Secure Cloud Bursting
179

Book Details

Subject
Computer Science
Publisher
Apress
Published
2014
Pages
240
Edition
1
Language
English
ISBN13
9781430261452
ISBN10
1430261455
ISBN13 Digital
9781430261469
ISBN10 Digital
1430261463
PDF Size
8.6 MB
License
CC BY-NC-ND

Related Books

Legal Dynamics of EU External Relations
This book offers a concise yet comprehensive review of the principles of EU external relations law. By carefully examining the role of the Union on the global scene, it provides a systematic overview of the relevant rules and competences, reflecting on the legal developments in their political and societal context. In addition to up-to-date analyse...
Food Price Volatility and Its Implications for Food Security and Policy
This book provides fresh insights into concepts, methods and new research findings on the causes of excessive food price volatility. It also discusses the implications for food security and policy responses to mitigate excessive volatility. The approaches applied by the contributors range from on-the-ground surveys, to panel econometrics and innova...
Transformation and Development
This book features various studies on democratization, transformation, political and economic development, and security issues in the Organization for Security and Cooperation in Europe (OSCE) geographical region and beyond. Written by experts and academics in the fields of human rights, security, transformation and development, particularly in pos...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Digital Technology and the Practices of Humanities Research
How does technology impact research practices in the humanities? How does digitisation shape scholarly identity? How do we negotiate trust in the digital realm? What is scholarship, what forms can it take, and how does it acquire authority? This diverse set of essays demonstrate the importance of asking such questions, bringing together establis...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...