About the Book:
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject.
The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security.
Table of Contents
Chapter 1: Cloud security ecosystemChapter 2: Cybercrime in cloud: Risks and responses in Hong Kong, SingaporeChapter 3: CATRA: Conceptual cloud attack taxonomy and risk assessment frameworkChapter 4: Multitiered cloud security modelChapter 5: A guide to homomorphic encryptionChapter 6: Protection through isolation: Virtues and pitfallsChapter 7: Protecting digital identity in the cloudChapter 8: Provenance for cloud data accountabilityChapter 9: Security as a service (SecaaS)—An overviewChapter 10: Secure migration to the cloud—In and outChapter 11: Keeping users empowered in a cloudy Internet of ThingsChapter 12: Cloud as infrastructure for managing complex scalable business networks, privacy perspectiveChapter 13: Psychology and security: Utilizing psychological and communication theories to promote safer cloud security behaviors
Chapter 14: Conceptual evidence collection and analysis methodology for Android devicesChapter 15: Mobile cloud forensics: An analysis of seven popular Android appsChapter 16: Recovering residual forensic data from smartphone interactions with cloud storage providersChapter 17: Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling ModelChapter 18: Cloud security and forensic readiness: The current state of an IaaS providerChapter 19: Ubuntu One investigation: Detecting evidences on client machinesChapter 20: Governance in the Cloud