Home Page Icon
Home Page
Table of Contents for
Title Page
Close
Title Page
by Enrique Castro-Leon, Raghu Yeluri
Building the Infrastructure for Cloud Security: A Solutions View
Title Page
About ApressOpen
Dedication
Contents at a Glance
Contents
About the Authors
About the Technical Reviewers
Acknowledgments
Foreword
Introduction
CHAPTER 1: Cloud Computing Basics
Defining the Cloud
Historical Context
Security as a Service
Summary
CHAPTER 2: The Trusted Cloud: Addressing Security and Compliance
Security Considerations for the Cloud
Trusted Computing Infrastructure
Trusted Cloud Usage Models
Trusted Cloud Value Proposition for Cloud Tenants
Summary
CHAPTER 3: Platform Boot Integrity: Foundation for Trusted Compute Pools
The Building blocks for Trusted Clouds
Platform Boot Integrity
Trusted Compute Pools
Solution Reference Architecture for the TCP
Reference Implementation: The Taiwan Stock Exchange Case Study
Summary
CHAPTER 4: Attestation: Proving Trustability
Attestation
The Attestation Process
A First Commercial Attestation Implementation: The Intel Trust Attestation Platform
Mt. Wilson Platform
Security of Mt. Wilson
Mt. Wilson Trust, Whitelisting, and Management APIs
Summary
CHAPTER 5: Boundary Control in the Cloud: Geo-Tagging and Asset Tagging
Geolocation
Geo-fencing
Asset Tagging
Trusted Compute Pools Usage with Geo-Tagging
Adding Geo-Tagging to the Trusted Compute Pools Solution
Geo-Tag Workflow and Lifecycle
Architecture for Geo-Tag Provisioning
Geo-Tag Provisioning Process
Reference Implementation
Summary
CHAPTER 6: Network Security in the Cloud
The Cloud Network
End-to-End Security in a Cloud
Software-Defined Security in the Cloud
Summary
CHAPTER 7: Identity Management and Control for Clouds
Identity Challenges
Identity Management System Requirements
Key Requirements for an Identity Management Solution
Identity Representations and Case Studies
Intel Identity Technologies
Summary
CHAPTER 8: Trusted Virtual Machines: Ensuring the Integrity of Virtual Machines in the Cloud
Requirements for Trusted Virtual Machines
Virtual Machine Images
A Conceptual Architecture for Trusted Virtual Machines
Workflows for Trusted Virtual Machines
Deploying Trusted Virtual Machines with OpenStack
Summary
CHAPTER 9: A Reference Design for Secure Cloud Bursting
Cloud Bursting Usage Models
Data Center Deployment Models
Cloud Bursting Reference Architecture
Network Topology and Considerations
Security Design Considerations
Practical Considerations for Virtual Machine Migration
Summary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Copyright
Building the
Infrastructure for
Cloud Security
A Solutions view
Raghu Yeluri
Enrique Castro-Leon
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset