Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security, privacy and trust in cloud systems
Nepal S., Pathan M., Springer Publishing Company, Incorporated, New York, NY, 2013. 450 pp. Type: Book (978-3-642385-85-8)
Date Reviewed: Mar 12 2014

Despite reduced cost, firms are worried about security, privacy, and trust issues in cloud systems. This book looks at some of these issues. It includes chapters contributed by researchers mostly from Australia and France. It is intended for systems architects, practitioners, product developers, researchers, and graduate-level students.

The book is divided into three parts. Part 1 covers cloud security. It contains five chapters that discuss cloud security issues, ways of realizing secure data allocation in the cloud, managing security in an adaptive fashion, resource allocation mechanisms for bettering cloud security, and mandatory access protection in cloud systems.

In Part 2, cloud privacy and trust are considered. The five chapters in this part cover identity management, data answerability, ways of preserving privacy, the security of outsourced databases, and reputation-based trust models for cloud systems.

Part 3 includes case studies on cloud security, privacy, and trust. It includes five chapters that discuss securing cloud data by combining cryptography with role-based access control, the control of business processes in cloud systems, machine-learning techniques for dealing with cyber attacks in cloud systems, and the legal aspects of data protection in cloud systems.

The chapters included in the book present future research directions and provide adequate references. The book includes many illustrations, some of which are in color. Authors from the US and other countries where cloud systems are widely used are not included. There are unfortunately some conspicuous typographical errors. Despite these limitations, as well as difficult readability (due to the small font size and some cluttered tables), the book is timely.

Reviewer:  S. V. Nagaraj Review #: CR142080 (1406-0432)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Cloud Computing (C.2.4 ... )
 
 
Privacy (K.4.1 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy