Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Guide to security assurance for cloud computing
Zhu S., Hill R., Trovati M., Springer International Publishing, New York, NY, 2016. 229 pp. Type: Book (978-3-319259-86-4)
Date Reviewed: Oct 11 2016

The title of this book is misleading; it is not a guide, but rather a collection of loosely related papers about cloud computing security. Some of the chapters have redundancies, each author has a different style, and most papers are survey style, all of which is not good organization for a guide. As an introduction to cloud security, this book is not appropriate. It is not appropriate as a textbook either, because of its lack of unification and completeness. Finally, it is not appropriate for business people trying to gain an understanding of the cloud because of its lack of structure and unified message.

The objective of the first part is to provide an introduction to, and perspective on, cloud computing security. There are chapters on cryptographic tools, secure migration, virtualization security, security of cloud storage, governance and risk, and a perspective for the future. The chapters in this part are rather disjointed and lack an introduction that could have explained how the topics fit together. Each chapter is independent of the others. Some of the chapters are verbose and do not provide clear perspectives on their subjects. The objective of this part is not reached; it is too technical for business people and too elementary for system architects and researchers. There is nothing on architecture, authorization, or firewalls, all important security aspects.

Part 2, which requires a much stronger background, is much better. These chapters are of interest to researchers, but will not be very useful to practitioners. This part includes five chapters on security certification, accountability, distributed denial of service (DDoS) protection, proofs of retrievability for data auditing, and architecture/security of vehicular clouds. The chapters on certification and accountability contain good descriptions of these two important topics. The chapter on DDoS protection is a good survey, but one wonders why only this attack is discussed in detail; several other attacks are also very important, like unauthorized access to data as well as a variety of problems due to network virtualization. The chapter on vehicular clouds seems out of place here; it is a very specialized application, still in the research stage, and the chapter says little about security.

Reviewer:  E. B. Fernandez Review #: CR144827 (1701-0006)
Bookmark and Share
  Featured Reviewer  
 
Cloud Computing (C.2.4 ... )
 
 
Distributed Systems (C.2.4 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Cloud Computing": Date
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (1 of 3)
Dec 14 2009
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (2 of 3)
Jan 26 2010
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (3 of 3)
Mar 18 2010
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy