Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/cloud-security-auditing/descriptif_4250879
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4250879

Cloud Security Auditing, 1st ed. 2019 Advances in Information Security Series, Vol. 76

Langue : Anglais

Auteurs :

Couverture de l’ouvrage Cloud Security Auditing
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers. It presents an off-line automated framework for auditing consistent isolation between virtual networks in OpenStack-managed cloud spanning over overlay and layer 2 by considering both cloud layers? views. A runtime security auditing framework for the cloud with special focus on the user-level including common access control and authentication mechanisms e.g., RBAC, ABAC and SSO is covered as well. 

This book also discusses a learning-based proactive security auditing system, which extracts probabilistic dependencies between runtime events and applies such dependencies to proactively audit and prevent security violations resulting from critical events. Finally, this book elaborates the design and implementation of a middleware as a pluggable interface to OpenStack for intercepting and verifying the legitimacy of user requests at runtime.

Many companies nowadays leverage cloud services for conducting major business operations (e.g., Web service, inventory management, customer service, etc.). However, the fear of losing control and governance still persists due to the inherent lack of transparency and trust in clouds. The complex design and implementation of cloud infrastructures may cause numerous vulnerabilities and misconfigurations, while the unique properties of clouds (elastic, self-service, multi-tenancy) can bring novel security challenges. In this book, the authors discuss how state-of-the-art security auditing solutions may help increase cloud tenants? trust in the service providers by providing assurance on the compliance with the applicable laws, regulations, policies, and standards. This book introduces the latest research results on both traditional retroactive auditing and novel (runtime and proactive) auditing techniques to serve different stakeholders in the cloud. This book covers security threats from different cloud abstraction levels and discusses a wide-range of security properties related to cloud-specific standards (e.g., Cloud Control Matrix (CCM) and ISO 27017). It also elaborates on the integration of security auditing solutions into real world cloud management platforms (e.g., OpenStack, Amazon AWS and Google GCP).

This book targets industrial scientists, who are working on cloud or security-related topics, as well as security practitioners, administrators, cloud providers and operators.
Researchers and advanced-level students studying and working in computer science, practically in cloud security will also be interested in this book.
1 Introduction.- 2 Literature Review.- 3 Auditing Security Compliance of Virtualized Infrastructure.- 4 Auditing Virtual Network Isolation across Cloud Layers.- 5 User-Level Runtime Security Auditing for the Cloud.- 6 Proactive Security Auditing in Clouds.- 7 Runtime Security Policy Enforcement in Clouds.- 8 Conclusion.
Suryadipta Majumdar is currently an Assistant Professor in the Information Security and Digital Forensics department at University at Albany - SUNY. Suryadipta received his Ph.D. on cloud security auditing from Concordia University, Canada. His research mainly focuses on cloud security, Software Defined Network (SDN) security and Internet of Things (IoT) security.

Taous Madi is currently an Experienced Researcher at Ericsson Canada. She holds a Ph.D. in Information Systems Engineering from Concordia University, Montreal. Previously, she finished her M.Sc. in mobile computing from the University of Science and Technology Houari Boumedien (USTHB), Algiers. Her research interests include cloud computing, network function virtualization security, software-defined networking security, internet of things security, machine learning and formal methods.

Yushun Wang completed his MASc in Information System Security from Concordia University. Previously, he worked as a customer network support engineer, Ericsson (China) for 12 years. He is currently working as a developer at Above Security Canada.

Azadeh Tabiban is currently a Ph.D. student at Concordia Institute for Information Systems Engineering (CIISE). She obtained her Master's degree in Information Systems Security from Concordia University, where she contributed to several research projects on cloud security auditing. Her research interest focuses on the development of more accountable and transparent virtualized environments; particularly on cloud and NFV provenance, intrusion detection, proactive auditing and secure virtualization in untrusted cloud infrastructures.

Momen Oqaily is currently working toward the Ph.D. degree in information and systems engineering at the Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada. He received his

Compiles a wide range of security properties from the most referenced cloud security standards and adapts these properties to different levels (e.g., user-level, virtual infrastructure and network) of current cloud platforms

Discusses the traditional auditing approach (a.k.a. retroactive approach) for the most popular cloud platforms

Includes advanced (e.g., runtime and proactive) auditing approaches, which can continuously audit the cloud management platform at runtime

Provides the detailed description of the auditing techniques with real life examples and thorough implementation steps including auditing algorithms, so that the security practitioners can adopt our approaches with minimum effort

Date de parution :

Ouvrage de 166 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

94,94 €

Ajouter au panier

Date de parution :

Ouvrage de 166 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

126,59 €

Ajouter au panier