Springer, 2014, -376 p.
This book provides cloud security and auditing implementation strategies and research directions to diverse audiences:
Academics and students: This book contains a comprehensive review of cloud security and auditing technologies, secure cloud architectures, programming languages, software and/or hardware based implementation and evaluation strategies for high performance cloud auditing and applications. It also provides introductory course materials for students.
Researchers: This book puts forth future research directions and provides important references to a variety of research areas. Researchers can find this material useful in developing their concepts and strategies.
Standard developers and policy makers: The standard developers need to use the high performance cloud auditing technology to adapt cloud security into the NCC-SRA or other cloud security reference models. Cloud access control and assured information sharing are useful to the policy makers.
Cloud vendors and auditors: This book presents a comprehensive treatment of cloud security and auditing technologies. This book provides useful knowledge for building secure clouds to process and analyze massive audit data sets and to meet the SLA requirements.
The objectives of this book are to present surveys, concepts, algorithms, techniques and components of high performance cloud auditing systems in order to reduce cloud security risks, and to increase availability and performance of cloud computing for surviving in a contested network environment.
Part I Cloud Architectures and Security IssuesAn Overview of Issues and Recent Developments in Cloud Computing and Storage Security
Moving Target Defense for Cloud Infrastructures: Lessons from Botnets
Secure Mobile Cloud Computing and Security Issues
Information Fusion in a Cloud-Enabled Environment
Part II Cloud Auditing and Assured Information SharingDiagnosing Vulnerability Patterns in Cloud Audit Logs
Exploiting Timing Side Channel in Secure Cloud Scheduling
Federated Cloud Security Architecture for Secure and Agile Clouds
Trust-Based Access Control for Secure Cloud Computing
Assured Information Sharing (AIS) Using Private Clouds
Part III High Performance Cloud ComputingGPGPU Computing for Cloud Auditing
CPU-GPU System Designs for High Performance Cloud Computing
MapReduce Performance in Federated Cloud Computing Environments
Improving Cloud Performance with Router-Based Filtering