Cloud Computing for Optimization: Foundations, Applications, and Challenges by Bhabani Shankar Prasad Mishra Himansu Das Satchidananda Dehuri & Alok Kumar Jagadev
Author:Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri & Alok Kumar Jagadev
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
10.2 Cloud Computing Security Objectives, Challenges
Security and Privacy has always been an essential factor in discussion related to computing. Security has always been regarded as one of non-functional requirements of a system such as reliability, maintainability etc. making it hard to measure. Providing too much security to applications may adversely affect quality of service parameters like response time, cost etc. However, providing less security may lead to security breaches of the cloud services which affect the reputation and mean time to recovery. Hence, planning smartly and providing an optimized security plays a great role in enabling the cloud applications to successfully function as designed and meet all the desired quality of service metrics. In this section, we discuss about such objective and challenges. Also Security Policy Implementation and challenges in virtual security management using VMWare ESX server case study as dealt with in the section.
Consider a scenario where a company is considering to move their products and information to cloud. Then, security of the organizations critical information in a cloud environment maintained by cloud service provider is of principal concern. Especially, when the data is being kept in geographically distributed cloud environments which are not under direct control of the company. In order to provide confidence to the companies and developers, the cloud service providers adhere to strict set of security requirement and objectives. This section [3] talks about such requirements, design constraints of secure cloud systems. We also cover topics related to challenges in policy implementation as well as go over case study of Virtualization security management using VMWare ESX server as example.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8306)
Test-Driven Development with Java by Alan Mellor(6770)
Data Augmentation with Python by Duc Haba(6685)
Principles of Data Fabric by Sonia Mezzetta(6431)
Learn Blender Simulations the Right Way by Stephen Pearson(6332)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6203)
Hadoop in Practice by Alex Holmes(5965)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5813)
RPA Solution Architect's Handbook by Sachin Sahgal(5600)
Big Data Analysis with Python by Ivan Marin(5385)
The Infinite Retina by Robert Scoble Irena Cronin(5293)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5154)
Pretrain Vision and Large Language Models in Python by Emily Webber(4350)
Infrastructure as Code for Beginners by Russ McKendrick(4113)
Functional Programming in JavaScript by Mantyla Dan(4042)
The Age of Surveillance Capitalism by Shoshana Zuboff(3961)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3829)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3630)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3603)
