Secure Cloud Computing

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud com

  • PDF / 8,317,391 Bytes
  • 351 Pages / 439.43 x 683.15 pts Page_size
  • 75 Downloads / 236 Views

DOWNLOAD

REPORT


ud Computing

Secure Cloud Computing

Sushil Jajodia • Krishna Kant Pierangela Samarati • Anoop Singhal Vipin Swarup • Cliff Wang Editors

Secure Cloud Computing

123

Editors Sushil Jajodia Center for Secure Information Systems George Mason University Fairfax, VA, USA Pierangela Samarati University of Milan Crema, Italy Vipin Swarup The MITRE Corporation McLean, VA, USA

Krishna Kant Center for Secure Information Systems George Mason University Fairfax, VA, USA Anoop Singhal Computer Security Division National Institute of Standards and Technology (NIST) Gaithersburg, MD, USA Cliff Wang Computing and Information Science Division Information Sciences Directorate Triangle Park, NC, USA

Images can be viewed in color by visiting the book’s web page on SpringerLink or downloading the eBook version.

ISBN 978-1-4614-9277-1 ISBN 978-1-4614-9278-8 (eBook) DOI 10.1007/978-1-4614-9278-8 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013957058 © Springer Science+Business Media New York 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)

Preface

Cloud computing continues to experience a rapid proliferation because of its potential advantages with respect to ease of deploying required computing capacity as needed and at a much lower cos