Table of Contents
Section I
Introduction Chapter 1 ▪ Cloud Computing Essentials 3
Anna Squicciarini, Daniela Oliveira, and Dan Lin
Chapter 2 ▪ An Overview of Cloud Computing 13
William Stallings
Chapter 3 ▪ Cloud Security Baselines 31
Daniela Oliveira, Anna Squicciarini, and Dan Lin
Chapter 4 ▪ Cloud Security, Privacy and Trust Baselines 45
Nikolaos Pitropakis, Sokratis Katsikas, and Costas Lambrinoudakis
Chapter 5 ▪ Infrastructure as a Service (IaaS) 65
Mario Santana
Section II Risk Analysis and Division of Responsibility
Chapter 6 ▪ Risk and Trust As ess ment: Schemes for Cloud Services 73
Erdal Cayirci
Chapter 7 ▪ Managing Risk in the Cloud 85
Michaela Iorga and Anil Karmel
Chapter 8 ▪ Cloud Security Risk Management 95
Marco Cremonini
Chapter 9 ▪ Secure Cloud Risk Management: Risk Mitigation Methods 115
Jim Harmening and Randall DeVitto
Section III Securing the Cloud Infrastructure
Chapter 10 ▪ Specification and Enforcement of Access Policies in Emerging Scenarios 129
Sabrina De Capitani di Vimercati, Sara Foresti, and Pierangela Samarati
Chapter 11 ▪ Cryptographic Key Management for Data Protection 151
Sarbari Gupta
Chapter 12 ▪ Cloud Security Access Control: Distributed Access Control 157
Jim Harmening and Randall DeVitto
Chapter 13 ▪ Cloud Security Key Management: Cloud User Controls 167
Weiyu Jiang, Jingqiang Lin, Zhan Wang, Bo Chen, and Kun Sun
Chapter 14 ▪ Cloud Computing Security Ess entials and Architecture 195
Michaela Iorga and Anil Karmel
Chapter 15 ▪ Cloud Computing Architecture and Security Concepts 213
Pramod Pandya and Riad Rahmo
Chapter 16 ▪ Secure Cloud Architecture 225
Pramod Pandya
Section IV Operating System and Network Security
Chapter 17 ▪ Locking Down Cloud Servers 237
Thorsten Herre
Chapter 18 ▪ Third-Party Providers Integrity Assurance for Data Outsourcing 255
Jiawei Yuan and Shucheng Yu
Section V Meeting Compliance Requirements
Chapter 19 ▪ Negotiating Cloud Security Requirements with Vendors 271
Daniel S. Soper
Chapter 20 ▪ Managing Legal Compliance in the Cloud: Understanding Contractual and
Personal Data Protection Requirements 283
Paolo Balboni
Chapter 21 ▪ Integrity Assurance for Data Outsourcing 299
Reza Curtmola and Bo Chen
Chapter 22 ▪ Secure Computation Outsourcing 311
Shams Zawoad and Ragib Hasan
Chapter 23 ▪ Computation Over Encrypted Data 329
Feng-Hao Liu
Chapter 24 ▪ Trusted Computing Technology 347
Felipe E. Medina
Chapter 25 ▪ Technology for Trusted Cloud Security: Survey and Open Issues 357
Roberto Di Pietro, Flavio Lombardi, and Matteo Signorini
Chapter 26 ▪ Trusted Computing Technology and Proposals for Resolving Cloud Computing
Security Problems 373
Ignazio Pedone, Daniele Canavese, and Antonio Lioy
Chapter 27 ▪ Assuring Compliance with Government Certification and Accreditation Regulations 387
Sarbari Gupta
Chapter 28 ▪ Government Certification, Accreditation, Regulations, and Compliance Risks 395
Thorsten Herre
Section VI Preparing for Disaster Recovery
Chapter 29 ▪ Simplifying Secure Cloud Computing Environments with Cloud Data Centers 411
Thorsten Herre
Chapter 30 ▪ Availability, Recovery, and Auditing across Data Centers 425
Reza Curtmola and Bo Chen
Section VII Advanced Cloud Computing Security
Chapter 31 ▪ Advanced Security Architecture for Cloud Computing 443
Albert Caballero
Chapter 32 ▪ Side-Channel Attacks and Defenses on Cloud Traffic 463
Wen Ming Liu and Lingyu Wang
Chapter 33 ▪ Clouds Are Evil 477
John Strand
Chapter 34 ▪ Future Directions in Cloud Computing Security: Risks and Challenges 489
Mohammad Kamrul Islam and Rasib Khan