Cloud Security Auditing (eBook)

eBook Download: PDF
2019 | 1st ed. 2019
XI, 166 Seiten
Springer International Publishing (Verlag)
978-3-030-23128-6 (ISBN)

Lese- und Medienproben

Cloud Security Auditing - Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers' views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. 

This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime.

Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants' trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP).

This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.
Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.


?Suryadipta Majumdar is currently an Assistant Professor in the Information Security and Digital Forensics department at University at Albany - SUNY. Suryadipta received his Ph.D. on cloud security auditing from Concordia University, Canada. His research mainly focuses on cloud security, Software Defined Network (SDN) security and Internet of Things (IoT) security.

Taous Madi is currently an Experienced Researcher at Ericsson Canada. She holds a Ph.D. in Information Systems Engineering from Concordia University, Montreal. Previously, she finished her M.Sc. in mobile computing from the University of Science and Technology Houari Boumedien (USTHB), Algiers. Her research interests include cloud computing, network function virtualization security, software-defined networking security, internet of things security, machine learning and formal methods.

Yushun Wang completed his MASc in Information System Security from Concordia University. Previously, he worked as a customer network support engineer, Ericsson (China) for 12 years. He is currently working as a developer at Above Security Canada.

Azadeh Tabiban is currently a Ph.D. student at Concordia Institute for Information Systems Engineering (CIISE). She obtained her Master's degree in Information Systems Security from Concordia University, where she contributed to several research projects on cloud security auditing. Her research interest focuses on the development of more accountable and transparent virtualized environments; particularly on cloud and NFV provenance, intrusion detection, proactive auditing and secure virtualization in untrusted cloud infrastructures.

Momen Oqaily is currently working toward the Ph.D. degree in information and systems engineering at the Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada. He received his B.S. degree in network engineering and security and the master's degree in Information Systems Engineering. His research interests include privacy and cloud computing security auditing.

Amir Alimohammadifar completed his BSc in Information Technology in 2010. He received his first master's in Information Technology, communication and computer networks from Sharif University of Technology, 2012, and his second master's in Information Systems Security from Concordia University. He is currently working as a security DevOps engineer at Gameloft Canada.

Yosr Jarraya is currently a researcher in security at Ericsson. Before that, she had a two-year MITACS postdoctoral fellowship with the company. She was previously Research Associate and Postdoctoral Fellow at Concordia University, Montreal. She received a Ph.D. in Electrical and Computer Engineering from Concordia University. She is the co-author of more than 30 research papers on topics including cloud security, network and software security, formal verification and SDN.

Makan Pourzandi is a research leader at Ericsson, Canada. He received his Ph.D. degree in Computer Science from the University of Lyon I Claude Bernard, France and a M.Sc. in parallel computing from École Normale Supérieure de Lyon, France. He has more than 20 years of experience in the fields of cyber security, Telecom and distributed systems. He co-authored a book on software security published by Springer on 2015 and is the co-inventor of 19 granted US patents. He has published more than 65 research papers in peer-reviewed scientific journals and conferences.

Lingyu Wang is a Professor at the Concordia Institute for Information Systems Engineering (CIISE) at Concordia University, Montreal, Canada. He holds the NSERC/Ericsson Senior Industrial Research Chair in SDN/NFV Security. He received his Ph.D. degree in Information Technology in 2006 from George Mason University. His research interests include cloud computing security, SDN/NFV security, security metrics, software security, and privacy. He has co-authored five books, two patents, and over 120 refereed conference and journal articles at reputable venues including TOPS, TIFS, TDSC, TMC, JCS, S&P, CCS, NDSS, ESORICS, PETS, ICDT, etc. 

Mourad Debbabi is a Full Professor at the Concordia Institute for Information Systems Engineering and Associate Dean Research and Graduate Studies at the Faculty of Engineering and Computer Science. He holds the NSERC/Hydro-Que?bec Thales Senior Industrial Research Chair in Smart Grid Security and the Concordia Research Chair Tier I in Information Systems Security. Dr. Debbabi holds Ph.D. and M.Sc. degrees in computer science from Paris-XI Orsay, University, France. He published three books and more than 260 peer-reviewed research articles in international journals and conferences on cyber security, cyber forensics, privacy, cryptographic protocols, threat intelligence generation, malware analysis, reverse engineering, specification and verification of safety-critical systems, smart grid, programming languages and type theory.
Erscheint lt. Verlag 28.8.2019
Reihe/Serie Advances in Information Security
Advances in Information Security
Zusatzinfo XI, 166 p. 75 illus., 10 illus. in color.
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Web / Internet
Technik Nachrichtentechnik
Schlagworte Access Control • Cloud Computing • Cloud Control Matrix (CCM) • cloud infrastructure security • Cloud Security • compliance verification • ISO 27017 • Layer 2 Security • Layer 3 Security • Network Isolation • OpenStack • Security auditing • Security Compliance • Virtual Network Security
ISBN-10 3-030-23128-3 / 3030231283
ISBN-13 978-3-030-23128-6 / 9783030231286
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 8,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Handbuch für Ausbildung und Beruf

von Vivian Pein

eBook Download (2024)
Rheinwerk Computing (Verlag)
27,93